[RFC] netx: only create one instance of JNLPClassLoader for entire application
Deepak Bhole
dbhole at redhat.com
Thu Jul 8 10:56:35 PDT 2010
* Omair Majid <omajid at redhat.com> [2010-07-08 09:59]:
> Hi,
>
> The attached patch modifies the JNLPClassLoader so only one instance
> of the loader is created per application. This patch also makes the
> classloader keep track of each JNLP file and the resources it loads.
> For applets, it only keeps track of the main applet JNLP (the
> PluginBridge) and uses that.
>
> Any comments?
>
> Cheers,
> Omair
We already use a single classloader (by merging extension loader paths
into the base loader)...
What bug required this change?
Deepak
> diff -r 7649271c60ab netx/net/sourceforge/jnlp/JNLPFile.java
> --- a/netx/net/sourceforge/jnlp/JNLPFile.java Wed Jun 30 19:15:49 2010 -0400
> +++ b/netx/net/sourceforge/jnlp/JNLPFile.java Mon Jul 05 15:27:26 2010 -0400
> @@ -287,7 +287,7 @@
> }
>
> /**
> - * Returns the location of the parent file if it exists, null otherwise
> + * Returns the unique key associated with this jnlp file
> */
> public String getUniqueKey() {
> return uniqueKey;
> diff -r 7649271c60ab netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
> --- a/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Wed Jun 30 19:15:49 2010 -0400
> +++ b/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Mon Jul 05 15:27:26 2010 -0400
> @@ -32,7 +32,6 @@
> import java.security.Permissions;
> import java.security.PrivilegedAction;
> import java.util.ArrayList;
> -import java.util.Collections;
> import java.util.Enumeration;
> import java.util.HashMap;
> import java.util.LinkedList;
> @@ -78,27 +77,24 @@
> /** shortcut for resources */
> private static String R(String key) { return JNLPRuntime.getMessage(key); }
>
> - /** map from JNLPFile url to shared classloader */
> - private static Map urlToLoader = new HashMap(); // never garbage collected!
> + /**
> + * map from a unique key (per application) to the classloader for that application
> + * Note: never garbage collected
> + */
> + private static Map<String, JNLPClassLoader> keyToLoader = new HashMap<String, JNLPClassLoader>();
>
> /** the directory for native code */
> private File nativeDir = null; // if set, some native code exists
>
> - /** a list of directories that contain native libraries */
> - private List<File> nativeDirectories = Collections.synchronizedList(new LinkedList<File>());
> -
> /** security context */
> private AccessControlContext acc = AccessController.getContext();
>
> /** the permissions for the cached jar files */
> - private List resourcePermissions;
> + private List<Permission> resourcePermissions;
>
> /** the app */
> private ApplicationInstance app = null; // here for faster lookup in security manager
>
> - /** list of this, local and global loaders this loader uses */
> - private JNLPClassLoader loaders[] = null; // ..[0]==this
> -
> /** whether to strictly adhere to the spec or not */
> private boolean strict = true;
>
> @@ -106,28 +102,25 @@
> private ResourceTracker tracker = new ResourceTracker(true); // prefetch
>
> /** the update policy for resources */
> - private UpdatePolicy updatePolicy;
> + private Map<JNLPFile, UpdatePolicy> policy= new HashMap<JNLPFile, UpdatePolicy>();
>
> /** the JNLP file */
> - private JNLPFile file;
> + private JNLPFile mainJnlp;
>
> - /** the resources section */
> - private ResourcesDesc resources;
> + /** extension JNLP files loaded by the main jnlp file */
> + private List<JNLPFile> extensionJnlps = new ArrayList<JNLPFile>();
> +
> + /** maps resource urls to the jnlp fiel that declares the resource */
> + private Map<String, JNLPFile> urlToJnlp = new HashMap<String, JNLPFile>();
>
> /** the security section */
> - private SecurityDesc security;
> + private Map<JNLPFile, SecurityDesc> security = new HashMap<JNLPFile, SecurityDesc>();
>
> /** Permissions granted by the user during runtime. */
> private ArrayList<Permission> runtimePermissions = new ArrayList<Permission>();
>
> /** all jars not yet part of classloader or active */
> - private List available = new ArrayList();
> -
> - /** all of the jar files that were verified */
> - private ArrayList<String> verifiedJars = null;
> -
> - /** all of the jar files that were not verified */
> - private ArrayList<String> unverifiedJars = null;
> + private List<JARDesc> available = new ArrayList<JARDesc>();
>
> /** the jarsigner tool to verify our jars */
> private JarSigner js = null;
> @@ -138,7 +131,7 @@
> private ArrayList<JarIndex> jarIndexes = new ArrayList<JarIndex>();
>
> /** File entries in the jar files available to this classloader */
> - private TreeSet jarEntries = new TreeSet();
> + private TreeSet<String> jarEntries = new TreeSet<String>();
>
> /**
> * Create a new JNLPClassLoader from the specified file.
> @@ -151,32 +144,36 @@
> if (JNLPRuntime.isDebug())
> System.out.println("New classloader: "+file.getFileLocation());
>
> - this.file = file;
> - this.updatePolicy = policy;
> - this.resources = file.getResources();
> -
> - // initialize extensions
> - initializeExtensions();
> -
> - // initialize permissions
> - initializePermissions();
> -
> - initializeResources();
> -
> - setSecurity();
> + loadJNLPFile(file, policy, false);
>
> }
>
> - private void setSecurity() {
> + private void loadJNLPFile(JNLPFile file, UpdatePolicy policy, boolean isExtension) throws LaunchException {
> +
> + if (isExtension) {
> + this.extensionJnlps.add(file);
> + } else {
> + this.mainJnlp = file;
> + }
> + this.policy.put(file, policy);
> +
> + initializeExtensions(file);
> + initializePermissions(file);
> + initializeResources(file);
> +
> + setSecurity(file);
> + }
> +
> + private void setSecurity(JNLPFile file) {
>
> URL codebase = null;
>
> - if (file.getCodeBase() != null) {
> - codebase = file.getCodeBase();
> + if (mainJnlp.getCodeBase() != null) {
> + codebase = mainJnlp.getCodeBase();
> } else {
> //Fixme: codebase should be the codebase of the Main Jar not
> //the location. Although, it still works in the current state.
> - codebase = file.getResources().getMainJAR().getLocation();
> + codebase = mainJnlp.getResources().getMainJAR().getLocation();
> }
>
> /**
> @@ -184,15 +181,15 @@
> * null since there is no jnlp file to specify permissions. We
> * determine security settings here, after trying to verify jars.
> */
> - if (file instanceof PluginBridge) {
> + if (mainJnlp instanceof PluginBridge) {
> if (signing == true) {
> - this.security = new SecurityDesc(file,
> + this.security.put(mainJnlp, new SecurityDesc(mainJnlp,
> SecurityDesc.ALL_PERMISSIONS,
> - codebase.getHost());
> + codebase.getHost()));
> } else {
> - this.security = new SecurityDesc(file,
> + this.security.put(mainJnlp, new SecurityDesc(mainJnlp,
> SecurityDesc.SANDBOX_PERMISSIONS,
> - codebase.getHost());
> + codebase.getHost()));
> }
> } else { //regular jnlp file
>
> @@ -205,92 +202,50 @@
> * use a sandbox instead.
> */
> if (signing == true) {
> - this.security = file.getSecurity();
> + this.security.put(file, file.getSecurity());
> } else {
> - this.security = new SecurityDesc(file,
> + this.security.put(file, new SecurityDesc(mainJnlp,
> SecurityDesc.SANDBOX_PERMISSIONS,
> - codebase.getHost());
> + codebase.getHost()));
> }
> }
> }
> -
> +
> /**
> * Returns a JNLP classloader for the specified JNLP file.
> *
> * @param file the file to load classes for
> * @param policy the update policy to use when downloading resources
> */
> - public static JNLPClassLoader getInstance(JNLPFile file, UpdatePolicy policy) throws LaunchException {
> + public static JNLPClassLoader getInstance(JNLPFile file, UpdatePolicy policy)
> + throws LaunchException {
> JNLPClassLoader baseLoader = null;
> JNLPClassLoader loader = null;
> String uniqueKey = file.getUniqueKey();
>
> if (uniqueKey != null)
> - baseLoader = (JNLPClassLoader) urlToLoader.get(uniqueKey);
> + baseLoader = (JNLPClassLoader) keyToLoader.get(uniqueKey);
>
> - try {
> -
> - // If base loader is null, or the baseloader's file and this
> - // file is different, initialize a new loader
> - if (baseLoader == null ||
> - !baseLoader.getJNLPFile().getFileLocation().equals(file.getFileLocation())) {
> + try {
>
> - loader = new JNLPClassLoader(file, policy);
> + // If base loader is null, or the baseloader's file and this
> + // file is different, initialize a new loader
> + if (baseLoader == null
> + || !baseLoader.getJNLPFile().getFileLocation().equals(file.getFileLocation())) {
>
> - // New loader init may have caused extentions to create a
> - // loader for this unique key. Check.
> - JNLPClassLoader extLoader = (JNLPClassLoader) urlToLoader.get(uniqueKey);
> + loader = new JNLPClassLoader(file, policy);
> + } else {
> + // if key is same and locations match, this is the loader we want
> + loader = baseLoader;
> + }
>
> - if (extLoader != null && extLoader != loader) {
> - for (URL u : loader.getURLs())
> - extLoader.addURL(u);
> - for (File nativeDirectory: loader.getNativeDirectories())
> - extLoader.addNativeDirectory(nativeDirectory);
> + } catch (LaunchException e) {
> + throw e;
> + }
>
> - loader = extLoader;
> - }
> -
> - // loader is now current + ext. But we also need to think of
> - // the baseLoader
> - if (baseLoader != null && baseLoader != loader) {
> - for (URL u : loader.getURLs())
> - baseLoader.addURL(u);
> - for (File nativeDirectory: loader.getNativeDirectories())
> - baseLoader.addNativeDirectory(nativeDirectory);
> -
> - loader = baseLoader;
> - }
> -
> - } else {
> - // if key is same and locations match, this is the loader we want
> - loader = baseLoader;
> - }
> -
> - } catch (LaunchException e) {
> - throw e;
> - }
> -
> - // loaders are mapped to a unique key. Only extensions and parent
> + // loaders are mapped to a unique key. Only extensions and parent
> // share a key, so it is safe to always share based on it
> - urlToLoader.put(uniqueKey, loader);
> -
> - return loader;
> - }
> -
> - /**
> - * Returns a JNLP classloader for the JNLP file at the specified
> - * location.
> - *
> - * @param location the file's location
> - * @param version the file's version
> - * @param policy the update policy to use when downloading resources
> - */
> - public static JNLPClassLoader getInstance(URL location, String uniqueKey, Version version, UpdatePolicy policy)
> - throws IOException, ParseException, LaunchException {
> - JNLPClassLoader loader = (JNLPClassLoader) urlToLoader.get(uniqueKey);
> -
> - if (loader == null || !location.equals(loader.getJNLPFile().getFileLocation()))
> - loader = getInstance(new JNLPFile(location, uniqueKey, version, false, policy), policy);
> + keyToLoader.put(uniqueKey, loader);
>
> return loader;
> }
> @@ -298,36 +253,30 @@
> /**
> * Load the extensions specified in the JNLP file.
> */
> - void initializeExtensions() {
> - ExtensionDesc[] ext = resources.getExtensions();
> + void initializeExtensions(JNLPFile originalFile) {
>
> - List loaderList = new ArrayList();
> + ExtensionDesc[] ext = originalFile.getResources().getExtensions();
> + for (int i = 0; i < ext.length; i++) {
> + try {
> + UpdatePolicy currentUpdatePolicy = policy.get(originalFile);
> + String uniqueKey = this.getJNLPFile().getUniqueKey();
> + JNLPFile extensionJnlp = new JNLPFile(ext[i].getLocation(), uniqueKey, ext[i]
> + .getVersion(), false, currentUpdatePolicy);
> + loadJNLPFile(extensionJnlp, currentUpdatePolicy, true);
> + } catch (Exception ex) {
> + ex.printStackTrace();
> + }
> + }
>
> - loaderList.add(this);
> -
> - //if (ext != null) {
> - for (int i=0; i < ext.length; i++) {
> - try {
> - String uniqueKey = this.getJNLPFile().getUniqueKey();
> - JNLPClassLoader loader = getInstance(ext[i].getLocation(), uniqueKey, ext[i].getVersion(), updatePolicy);
> - loaderList.add(loader);
> - }
> - catch (Exception ex) {
> - ex.printStackTrace();
> - }
> - }
> - //}
> -
> - loaders = (JNLPClassLoader[]) loaderList.toArray(new JNLPClassLoader[ loaderList.size()]);
> }
>
> /**
> * Make permission objects for the classpath.
> */
> - void initializePermissions() {
> - resourcePermissions = new ArrayList();
> + void initializePermissions(JNLPFile file) {
> + resourcePermissions = new ArrayList<Permission>();
>
> - JARDesc jars[] = resources.getJARs();
> + JARDesc jars[] = file.getResources().getJARs();
> for (int i=0; i < jars.length; i++) {
> Permission p = CacheUtil.getReadPermission(jars[i].getLocation(),
> jars[i].getVersion());
> @@ -347,8 +296,8 @@
> * Load all of the JARs used in this JNLP file into the
> * ResourceTracker for downloading.
> */
> - void initializeResources() throws LaunchException {
> - JARDesc jars[] = resources.getJARs();
> + void initializeResources(JNLPFile file) throws LaunchException {
> + JARDesc jars[] = file.getResources().getJARs();
> if (jars == null || jars.length == 0)
> return;
> /*
> @@ -357,12 +306,12 @@
> R("LCInit"), R("LFatalVerification"), "No jars!");
> }
> */
> - List initialJars = new ArrayList();
> + List<JARDesc> initialJars = new ArrayList<JARDesc>();
>
> for (int i=0; i < jars.length; i++) {
>
> + addUrlToJnlpFileMapping(jars[i].getLocation().toString(), file);
> available.add(jars[i]);
> -
> if (jars[i].isEager())
> initialJars.add(jars[i]); // regardless of part
>
> @@ -397,7 +346,7 @@
>
> //user does not trust this publisher
> if (!js.getAlreadyTrustPublisher()) {
> - checkTrustWithUser(js);
> + checkTrustWithUser(js, file);
> } else {
> /**
> * If the user trusts this publisher (i.e. the publisher's certificate
> @@ -415,7 +364,7 @@
> activateJars(initialJars);
> }
>
> - private void checkTrustWithUser(JarSigner js) throws LaunchException {
> + private void checkTrustWithUser(JarSigner js, JNLPFile file) throws LaunchException {
> if (!js.getRootInCacerts()) { //root cert is not in cacerts
> boolean b = SecurityWarningDialog.showCertWarningDialog(
> SecurityWarningDialog.AccessType.UNVERIFIED, file, js);
> @@ -443,7 +392,7 @@
> * loaded from the codebase are not cached.
> */
> public void enableCodeBase() {
> - addURL( file.getCodeBase() ); // nothing happens if called more that once?
> + addURL( mainJnlp.getCodeBase() ); // nothing happens if called more that once?
> }
>
> /**
> @@ -472,7 +421,7 @@
> * Returns the JNLP file the classloader was created from.
> */
> public JNLPFile getJNLPFile() {
> - return file;
> + return mainJnlp;
> }
>
> /**
> @@ -485,20 +434,26 @@
> // access w/o security dialog once we actually check certificates.
>
> // copy security permissions from SecurityDesc element
> - if (security != null) {
> + if (security.size() != 0) {
> // Security desc. is used only to track security settings for the
> // application. However, an application may comprise of multiple
> // jars, and as such, security must be evaluated on a per jar basis.
> -
> +
> + JNLPFile file = getJnlpFileForUrl(cs.getLocation().toString());
> +
> + if (JNLPRuntime.isDebug()) {
> + System.out.println("Reading security settings for " + cs.getLocation().toString() + " using " + file.getSourceLocation());
> + }
> +
> // set default perms
> - PermissionCollection permissions = security.getSandBoxPermissions();
> + PermissionCollection permissions = security.get(file).getSandBoxPermissions();
>
> // If more than default is needed, evaluate based on codesource
> - if (security.getSecurityType().equals(SecurityDesc.ALL_PERMISSIONS) ||
> - security.getSecurityType().equals(SecurityDesc.J2EE_PERMISSIONS)) {
> + if (security.get(file).getSecurityType().equals(SecurityDesc.ALL_PERMISSIONS) ||
> + security.get(file).getSecurityType().equals(SecurityDesc.J2EE_PERMISSIONS)) {
>
> if (cs.getCodeSigners() != null) {
> - permissions = security.getPermissions();
> + permissions = security.get(file).getPermissions();
> }
> }
>
> @@ -509,7 +464,7 @@
>
> // add in permission to read the cached JAR files
> for (int i=0; i < resourcePermissions.size(); i++)
> - result.add((Permission) resourcePermissions.get(i));
> + result.add(resourcePermissions.get(i));
>
> // add in the permissions that the user granted.
> for (int i=0; i < runtimePermissions.size(); i++)
> @@ -527,12 +482,12 @@
> * to be loaded at the same time as the JARs specified (ie, are
> * in the same part).
> */
> - protected void fillInPartJars(List jars) {
> + protected void fillInPartJars(List<JARDesc> jars) {
> for (int i=0; i < jars.size(); i++) {
> - String part = ((JARDesc) jars.get(i)).getPart();
> + String part = jars.get(i).getPart();
>
> for (int a=0; a < available.size(); a++) {
> - JARDesc jar = (JARDesc) available.get(a);
> + JARDesc jar = available.get(a);
>
> if (part != null && part.equals(jar.getPart()))
> if (!jars.contains(jar))
> @@ -549,24 +504,25 @@
> *
> * @param jars the list of jars to load
> */
> - protected void activateJars(final List jars) {
> - PrivilegedAction activate = new PrivilegedAction() {
> + protected void activateJars(final List<JARDesc> jars) {
> + PrivilegedAction<Object> activate = new PrivilegedAction<Object>() {
>
> public Object run() {
> // transfer the Jars
> waitForJars(jars);
>
> for (int i=0; i < jars.size(); i++) {
> - JARDesc jar = (JARDesc) jars.get(i);
> + JARDesc jar = jars.get(i);
>
> available.remove(jar);
> -
> // add jar
> File localFile = tracker.getCacheFile(jar.getLocation());
> try {
> URL location = jar.getLocation(); // non-cacheable, use source location
> if (localFile != null) {
> location = localFile.toURL(); // cached file
> + JNLPFile fileForJar = getJnlpFileForUrl(jar.getLocation().toString());
> + addUrlToJnlpFileMapping(location.toString(), fileForJar);
>
> // This is really not the best way.. but we need some way for
> // PluginAppletViewer::getCachedImageRef() to check if the image
> @@ -610,10 +566,12 @@
> signer.verifyJar(extractedJarLocation);
>
> if (signer.anyJarsSigned() && !signer.getAlreadyTrustPublisher()) {
> - checkTrustWithUser(signer);
> + checkTrustWithUser(signer, fileForJar);
> }
>
> try {
> + addUrlToJnlpFileMapping(new URL("file://" + extractedJarLocation).toString(),
> + getJnlpFileForUrl(jar.getLocation().toString()));
> addURL(new URL("file://" + extractedJarLocation));
> } catch (MalformedURLException mfue) {
> if (JNLPRuntime.isDebug())
> @@ -724,64 +682,25 @@
>
> if (!nativeDir.mkdirs())
> return null;
> - else {
> - // add this new native directory to the search path
> - addNativeDirectory(nativeDir);
> + else
> return nativeDir;
> - }
> - }
> -
> - /**
> - * Adds the {@link File} to the search path of this {@link JNLPClassLoader}
> - * when trying to find a native library
> - */
> - protected void addNativeDirectory(File nativeDirectory) {
> - nativeDirectories.add(nativeDirectory);
> - }
> -
> - /**
> - * Returns a list of all directories in the search path of the current classloader
> - * when it tires to find a native library.
> - * @return a list of directories in the search path for native libraries
> - */
> - protected List<File> getNativeDirectories() {
> - return nativeDirectories;
> }
>
> /**
> * Return the absolute path to the native library.
> */
> protected String findLibrary(String lib) {
> + if (nativeDir == null)
> + return null;
> +
> String syslib = System.mapLibraryName(lib);
>
> - for (File dir: getNativeDirectories()) {
> - File target = new File(dir, syslib);
> - if (target.exists())
> - return target.toString();
> + File target = new File(nativeDir, syslib);
> + if (target.exists())
> + return target.toString();
> + else {
> + return super.findLibrary(lib);
> }
> -
> - String result = super.findLibrary(lib);
> - if (result != null)
> - return result;
> -
> - return findLibraryExt(lib);
> - }
> -
> - /**
> - * Try to find the library path from another peer classloader.
> - */
> - protected String findLibraryExt(String lib) {
> - for (int i=0; i < loaders.length; i++) {
> - String result = null;
> -
> - if (loaders[i] != this)
> - result = loaders[i].findLibrary(lib);
> -
> - if (result != null)
> - return result;
> - }
> -
> - return null;
> }
>
> /**
> @@ -790,16 +709,16 @@
> *
> * @param jars the jars
> */
> - private void waitForJars(List jars) {
> + private void waitForJars(List<JARDesc> jars) {
> URL urls[] = new URL[jars.size()];
>
> for (int i=0; i < jars.size(); i++) {
> - JARDesc jar = (JARDesc) jars.get(i);
> + JARDesc jar = jars.get(i);
>
> urls[i] = jar.getLocation();
> }
>
> - CacheUtil.waitForResources(app, tracker, urls, file.getTitle());
> + CacheUtil.waitForResources(app, tracker, urls, mainJnlp.getTitle());
> }
>
> /**
> @@ -817,20 +736,8 @@
> /**
> * Find the loaded class in this loader or any of its extension loaders.
> */
> - protected Class findLoadedClassAll(String name) {
> - for (int i=0; i < loaders.length; i++) {
> - Class result = null;
> -
> - if (loaders[i] == this)
> - result = super.findLoadedClass(name);
> - else
> - result = loaders[i].findLoadedClassAll(name);
> -
> - if (result != null)
> - return result;
> - }
> -
> - return null;
> + protected Class<?> findLoadedClassAll(String name) {
> + return super.findLoadedClass(name);
> }
>
> /**
> @@ -838,9 +745,9 @@
> * classloader, or one of the classloaders for the JNLP file's
> * extensions.
> */
> - public Class loadClass(String name) throws ClassNotFoundException {
> + public Class<?> loadClass(String name) throws ClassNotFoundException {
>
> - Class result = findLoadedClassAll(name);
> + Class<?> result = findLoadedClassAll(name);
>
> // try parent classloader
> if (result == null) {
> @@ -874,7 +781,7 @@
> for (String jarName: jarList) {
> JARDesc desc;
> try {
> - desc = new JARDesc(new URL(file.getCodeBase(), jarName),
> + desc = new JARDesc(new URL(mainJnlp.getCodeBase(), jarName),
> null, null, false, true, false, true);
> } catch (MalformedURLException mfe) {
> throw new ClassNotFoundException(name);
> @@ -889,7 +796,7 @@
>
> URL remoteURL;
> try {
> - remoteURL = new URL(file.getCodeBase() + jarName);
> + remoteURL = new URL(mainJnlp.getCodeBase() + jarName);
> } catch (MalformedURLException mfe) {
> throw new ClassNotFoundException(name);
> }
> @@ -916,32 +823,13 @@
> return result;
> }
>
> - /**
> - * Find the class in this loader or any of its extension loaders.
> - */
> - protected Class findClass(String name) throws ClassNotFoundException {
> - for (int i=0; i < loaders.length; i++) {
> - try {
> - if (loaders[i] == this)
> - return super.findClass(name);
> - else
> - return loaders[i].findClass(name);
> - }
> - catch(ClassNotFoundException ex) { }
> - catch(ClassFormatError cfe) {}
> - }
> -
> - throw new ClassNotFoundException(name);
> - }
>
> /**
> * Search for the class by incrementally adding resources to the
> * classloader and its extension classloaders until the resource
> * is found.
> */
> - private Class loadClassExt(String name) throws ClassNotFoundException {
> - // make recursive
> - addAvailable();
> + private Class<?> loadClassExt(String name) throws ClassNotFoundException {
>
> // find it
> try {
> @@ -970,33 +858,19 @@
> * class loaders.
> */
> public URL getResource(String name) {
> - URL result = super.getResource(name);
> -
> - for (int i=1; i < loaders.length; i++)
> - if (result == null)
> - result = loaders[i].getResource(name);
> -
> - return result;
> + return super.getResource(name);
> }
>
> /**
> * Finds the resource in this, the parent, or the extension
> * class loaders.
> */
> - public Enumeration findResources(String name) throws IOException {
> - Vector resources = new Vector();
> + public Enumeration<URL> findResources(String name) throws IOException {
> + Vector<URL> resources = new Vector<URL>();
>
> - for (int i=0; i < loaders.length; i++) {
> - Enumeration e;
> -
> - if (loaders[i] == this)
> - e = super.findResources(name);
> - else
> - e = loaders[i].findResources(name);
> -
> - while (e.hasMoreElements())
> - resources.add(e.nextElement());
> - }
> + Enumeration<URL> e = super.findResources(name);
> + while (e.hasMoreElements())
> + resources.add(e.nextElement());
>
> return resources.elements();
> }
> @@ -1012,19 +886,6 @@
> }
>
> /**
> - * Adds whatever resources have already been downloaded in the
> - * background.
> - */
> - protected void addAvailable() {
> - // go through available, check tracker for it and all of its
> - // part brothers being available immediately, add them.
> -
> - for (int i=1; i < loaders.length; i++) {
> - loaders[i].addAvailable();
> - }
> - }
> -
> - /**
> * Adds the next unused resource to the classloader. That
> * resource and all those in the same part will be downloaded
> * and added to the classloader before returning. If there are
> @@ -1034,58 +895,46 @@
> */
> protected JNLPClassLoader addNextResource() {
> if (available.size() == 0) {
> - for (int i=1; i < loaders.length; i++) {
> - JNLPClassLoader result = loaders[i].addNextResource();
> -
> - if (result != null)
> - return result;
> - }
> return null;
> }
>
> // add jar
> - List jars = new ArrayList();
> + List<JARDesc> jars = new ArrayList<JARDesc>();
> jars.add(available.get(0));
>
> fillInPartJars(jars);
> -
> -
> activateJars(jars);
>
> return this;
> }
>
> - // this part compatibility with previous classloader
> - /**
> - * @deprecated
> - */
> - public String getExtensionName() {
> - String result = file.getInformation().getTitle();
> -
> - if (result == null)
> - result = file.getInformation().getDescription();
> - if (result == null && file.getFileLocation() != null)
> - result = file.getFileLocation().toString();
> - if (result == null && file.getCodeBase() != null)
> - result = file.getCodeBase().toString();
> -
> - return result;
> - }
> -
> - /**
> - * @deprecated
> - */
> - public String getExtensionHREF() {
> - return file.getFileLocation().toString();
> - }
> -
> public boolean getSigning() {
> return signing;
> }
>
> - protected SecurityDesc getSecurity() {
> + private Map<JNLPFile, SecurityDesc> getSecurity() {
> return security;
> }
> +
> + private void addUrlToJnlpFileMapping(String url, JNLPFile theFile) {
> + if (JNLPRuntime.isDebug()) {
> + System.out.println("Adding mapping: " + url + " -> " + theFile.toString());
> + }
> + urlToJnlp.put(url, theFile);
> + }
> +
> + private JNLPFile getJnlpFileForUrl(String url) {
> + if (JNLPRuntime.isDebug()) {
> + System.out.println("Getting mapping for : " + url);
> + }
> +
> + if (mainJnlp.isApplet()) {
> + return mainJnlp;
> + }
> +
> + return urlToJnlp.get(url);
> + }
> +
> }
>
>
More information about the distro-pkg-dev
mailing list