[RFC] netx: only create one instance of JNLPClassLoader for entire application

Deepak Bhole dbhole at redhat.com
Thu Jul 8 10:56:35 PDT 2010


* Omair Majid <omajid at redhat.com> [2010-07-08 09:59]:
> Hi,
> 
> The attached patch modifies the JNLPClassLoader so only one instance
> of the loader is created per application. This patch also makes the
> classloader keep track of each JNLP file and the resources it loads.
> For applets, it only keeps track of the main applet JNLP (the
> PluginBridge) and uses that.
> 
> Any comments?
> 
> Cheers,
> Omair

We already use a single classloader (by merging extension loader paths
into the base loader)...

What bug required this change?

Deepak

> diff -r 7649271c60ab netx/net/sourceforge/jnlp/JNLPFile.java
> --- a/netx/net/sourceforge/jnlp/JNLPFile.java	Wed Jun 30 19:15:49 2010 -0400
> +++ b/netx/net/sourceforge/jnlp/JNLPFile.java	Mon Jul 05 15:27:26 2010 -0400
> @@ -287,7 +287,7 @@
>      }
>  
>      /**
> -     * Returns the location of the parent file if it exists, null otherwise
> +     * Returns the unique key associated with this jnlp file
>       */
>      public String getUniqueKey() {
>          return uniqueKey;
> diff -r 7649271c60ab netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
> --- a/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java	Wed Jun 30 19:15:49 2010 -0400
> +++ b/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java	Mon Jul 05 15:27:26 2010 -0400
> @@ -32,7 +32,6 @@
>  import java.security.Permissions;
>  import java.security.PrivilegedAction;
>  import java.util.ArrayList;
> -import java.util.Collections;
>  import java.util.Enumeration;
>  import java.util.HashMap;
>  import java.util.LinkedList;
> @@ -78,27 +77,24 @@
>      /** shortcut for resources */
>      private static String R(String key) { return JNLPRuntime.getMessage(key); }
>  
> -    /** map from JNLPFile url to shared classloader */
> -    private static Map urlToLoader = new HashMap(); // never garbage collected!
> +    /**
> +     * map from a unique key (per application) to the classloader for that application
> +     * Note: never garbage collected
> +     */
> +    private static Map<String, JNLPClassLoader> keyToLoader = new HashMap<String, JNLPClassLoader>(); 
>  
>      /** the directory for native code */
>      private File nativeDir = null; // if set, some native code exists
>  
> -    /** a list of directories that contain native libraries */
> -    private List<File> nativeDirectories = Collections.synchronizedList(new LinkedList<File>());
> -
>      /** security context */
>      private AccessControlContext acc = AccessController.getContext();
>  
>      /** the permissions for the cached jar files */
> -    private List resourcePermissions;
> +    private List<Permission> resourcePermissions;
>  
>      /** the app */
>      private ApplicationInstance app = null; // here for faster lookup in security manager
>  
> -    /** list of this, local and global loaders this loader uses */
> -    private JNLPClassLoader loaders[] = null; // ..[0]==this
> -
>      /** whether to strictly adhere to the spec or not */
>      private boolean strict = true;
>  
> @@ -106,28 +102,25 @@
>      private ResourceTracker tracker = new ResourceTracker(true); // prefetch
>  
>      /** the update policy for resources */
> -    private UpdatePolicy updatePolicy;
> +    private Map<JNLPFile, UpdatePolicy> policy= new HashMap<JNLPFile, UpdatePolicy>();
>  
>      /** the JNLP file */
> -    private JNLPFile file;
> +    private JNLPFile mainJnlp;
>  
> -    /** the resources section */
> -    private ResourcesDesc resources;
> +    /** extension JNLP files loaded by the main jnlp file */
> +    private List<JNLPFile> extensionJnlps = new ArrayList<JNLPFile>();
> +
> +    /** maps resource urls to the jnlp fiel that declares the resource */
> +    private Map<String, JNLPFile> urlToJnlp = new HashMap<String, JNLPFile>();
>  
>      /** the security section */
> -    private SecurityDesc security;
> +    private Map<JNLPFile, SecurityDesc> security = new HashMap<JNLPFile, SecurityDesc>();
>      
>      /** Permissions granted by the user during runtime. */
>      private ArrayList<Permission> runtimePermissions = new ArrayList<Permission>();
>  
>      /** all jars not yet part of classloader or active */
> -    private List available = new ArrayList();
> -
> -	/** all of the jar files that were verified */
> -	private ArrayList<String> verifiedJars = null;
> -
> -	/** all of the jar files that were not verified */
> -	private ArrayList<String> unverifiedJars = null;
> +    private List<JARDesc> available = new ArrayList<JARDesc>();
>  
>  	/** the jarsigner tool to verify our jars */
>  	private JarSigner js = null;
> @@ -138,7 +131,7 @@
>  	private ArrayList<JarIndex> jarIndexes = new ArrayList<JarIndex>();
>  	
>  	/** File entries in the jar files available to this classloader */
> -	private TreeSet jarEntries = new TreeSet();
> +	private TreeSet<String> jarEntries = new TreeSet<String>();
>  
>      /**
>       * Create a new JNLPClassLoader from the specified file.
> @@ -151,32 +144,36 @@
>          if (JNLPRuntime.isDebug())
>              System.out.println("New classloader: "+file.getFileLocation());
>  
> -        this.file = file;
> -        this.updatePolicy = policy;
> -        this.resources = file.getResources();
> -
> -        // initialize extensions
> -        initializeExtensions();
> -
> -        // initialize permissions
> -        initializePermissions();
> -
> -        initializeResources();
> -
> -        setSecurity();
> +        loadJNLPFile(file, policy, false);
>  
>      }
>  
> -    private void setSecurity() {
> +    private void loadJNLPFile(JNLPFile file, UpdatePolicy policy, boolean isExtension) throws LaunchException {
> +
> +        if (isExtension) {
> +            this.extensionJnlps.add(file);
> +        } else {
> +            this.mainJnlp = file;
> +        }
> +        this.policy.put(file, policy);
> +
> +        initializeExtensions(file);
> +        initializePermissions(file);
> +        initializeResources(file);
> +
> +        setSecurity(file);
> +    }
> +
> +    private void setSecurity(JNLPFile file) {
>  		
>          URL codebase = null;
>  
> -        if (file.getCodeBase() != null) {
> -            codebase = file.getCodeBase();
> +        if (mainJnlp.getCodeBase() != null) {
> +            codebase = mainJnlp.getCodeBase();
>          } else {
>              //Fixme: codebase should be the codebase of the Main Jar not 
>              //the location. Although, it still works in the current state.
> -            codebase = file.getResources().getMainJAR().getLocation();
> +            codebase = mainJnlp.getResources().getMainJAR().getLocation();
>          }
>  
>          /**
> @@ -184,15 +181,15 @@
>           * null since there is no jnlp file to specify permissions. We
>           * determine security settings here, after trying to verify jars.
>           */
> -        if (file instanceof PluginBridge) {
> +        if (mainJnlp instanceof PluginBridge) {
>              if (signing == true) {
> -                this.security = new SecurityDesc(file, 
> +                this.security.put(mainJnlp, new SecurityDesc(mainJnlp, 
>                      SecurityDesc.ALL_PERMISSIONS,
> -                    codebase.getHost());
> +                    codebase.getHost()));
>              } else {
> -                this.security = new SecurityDesc(file, 
> +                this.security.put(mainJnlp, new SecurityDesc(mainJnlp, 
>                      SecurityDesc.SANDBOX_PERMISSIONS, 
> -                    codebase.getHost());
> +                    codebase.getHost()));
>              }
>          } else { //regular jnlp file
>  			
> @@ -205,92 +202,50 @@
>               * use a sandbox instead. 
>               */
>              if (signing == true) {
> -                this.security = file.getSecurity();
> +                this.security.put(file, file.getSecurity());
>              } else {
> -                this.security = new SecurityDesc(file, 
> +                this.security.put(file, new SecurityDesc(mainJnlp, 
>                          SecurityDesc.SANDBOX_PERMISSIONS, 
> -                        codebase.getHost());
> +                        codebase.getHost()));
>              }
>          }
>      }
> -    
> +
>      /**
>       * Returns a JNLP classloader for the specified JNLP file.
>       *
>       * @param file the file to load classes for
>       * @param policy the update policy to use when downloading resources
>       */
> -    public static JNLPClassLoader getInstance(JNLPFile file, UpdatePolicy policy) throws LaunchException {
> +    public static JNLPClassLoader getInstance(JNLPFile file, UpdatePolicy policy)
> +            throws LaunchException {
>          JNLPClassLoader baseLoader = null;
>          JNLPClassLoader loader = null;
>          String uniqueKey = file.getUniqueKey();
>  
>          if (uniqueKey != null)
> -            baseLoader = (JNLPClassLoader) urlToLoader.get(uniqueKey);
> +            baseLoader = (JNLPClassLoader) keyToLoader.get(uniqueKey);
>  
> -		try {
> -		    
> -		    // If base loader is null, or the baseloader's file and this 
> -		    // file is different, initialize a new loader
> -		    if (baseLoader == null || 
> -		        !baseLoader.getJNLPFile().getFileLocation().equals(file.getFileLocation())) {
> +        try {
>  
> -		        loader = new JNLPClassLoader(file, policy);
> +            // If base loader is null, or the baseloader's file and this
> +            // file is different, initialize a new loader
> +            if (baseLoader == null
> +                    || !baseLoader.getJNLPFile().getFileLocation().equals(file.getFileLocation())) {
>  
> -		        // New loader init may have caused extentions to create a 
> -		        // loader for this unique key. Check.
> -		        JNLPClassLoader extLoader = (JNLPClassLoader) urlToLoader.get(uniqueKey);
> +                loader = new JNLPClassLoader(file, policy);
> +            } else {
> +                // if key is same and locations match, this is the loader we want
> +                loader = baseLoader;
> +            }
>  
> -		        if (extLoader != null && extLoader != loader) {
> -		            for (URL u : loader.getURLs())
> -		                extLoader.addURL(u);
> -		            for (File nativeDirectory: loader.getNativeDirectories())
> -		                extLoader.addNativeDirectory(nativeDirectory);
> +        } catch (LaunchException e) {
> +            throw e;
> +        }
>  
> -		            loader = extLoader;
> -		        }
> -
> -                // loader is now current + ext. But we also need to think of 
> -                // the baseLoader
> -		        if (baseLoader != null && baseLoader != loader) {
> -                    for (URL u : loader.getURLs())
> -                        baseLoader.addURL(u);
> -                    for (File nativeDirectory: loader.getNativeDirectories())
> -                        baseLoader.addNativeDirectory(nativeDirectory);
> -
> -                    loader = baseLoader;
> -                } 
> -
> -		    } else {
> -		        // if key is same and locations match, this is the loader we want
> -		        loader = baseLoader;
> -		    }
> -
> -		} catch (LaunchException e) {
> -			throw e;
> -		}
> -
> -        // loaders are mapped to a unique key. Only extensions and parent 
> +        // loaders are mapped to a unique key. Only extensions and parent
>          // share a key, so it is safe to always share based on it
> -        urlToLoader.put(uniqueKey, loader);
> -
> -        return loader;
> -    }
> -
> -    /**
> -     * Returns a JNLP classloader for the JNLP file at the specified
> -     * location. 
> -     *
> -     * @param location the file's location
> -     * @param version the file's version
> -     * @param policy the update policy to use when downloading resources
> -     */
> -    public static JNLPClassLoader getInstance(URL location, String uniqueKey, Version version, UpdatePolicy policy)
> -            throws IOException, ParseException, LaunchException {
> -        JNLPClassLoader loader = (JNLPClassLoader) urlToLoader.get(uniqueKey);
> -
> -        if (loader == null || !location.equals(loader.getJNLPFile().getFileLocation()))
> -            loader = getInstance(new JNLPFile(location, uniqueKey, version, false, policy), policy);
> +        keyToLoader.put(uniqueKey, loader);
>  
>          return loader;
>      }
> @@ -298,36 +253,30 @@
>      /**
>       * Load the extensions specified in the JNLP file.
>       */
> -    void initializeExtensions() {
> -        ExtensionDesc[] ext = resources.getExtensions();
> +    void initializeExtensions(JNLPFile originalFile) {
>  
> -        List loaderList = new ArrayList();
> +        ExtensionDesc[] ext = originalFile.getResources().getExtensions();
> +        for (int i = 0; i < ext.length; i++) {
> +            try {
> +                UpdatePolicy currentUpdatePolicy = policy.get(originalFile);
> +                String uniqueKey = this.getJNLPFile().getUniqueKey();
> +                JNLPFile extensionJnlp = new JNLPFile(ext[i].getLocation(), uniqueKey, ext[i]
> +                        .getVersion(), false, currentUpdatePolicy);
> +                loadJNLPFile(extensionJnlp, currentUpdatePolicy, true);
> +            } catch (Exception ex) {
> +                ex.printStackTrace();
> +            }
> +        }
>  
> -        loaderList.add(this);
> -
> -		//if (ext != null) {
> -        	for (int i=0; i < ext.length; i++) {
> -            	try {
> -                    String uniqueKey = this.getJNLPFile().getUniqueKey();
> -                    JNLPClassLoader loader = getInstance(ext[i].getLocation(), uniqueKey, ext[i].getVersion(), updatePolicy);
> -                    loaderList.add(loader);
> -            	}
> -            	catch (Exception ex) {
> -                	ex.printStackTrace();
> -            	}
> -        	}
> -		//}
> -
> -        loaders = (JNLPClassLoader[]) loaderList.toArray(new JNLPClassLoader[ loaderList.size()]);
>      }
>  
>      /**
>       * Make permission objects for the classpath.
>       */
> -    void initializePermissions() {
> -        resourcePermissions = new ArrayList();
> +    void initializePermissions(JNLPFile file) {
> +        resourcePermissions = new ArrayList<Permission>();
>  
> -        JARDesc jars[] = resources.getJARs();
> +        JARDesc jars[] = file.getResources().getJARs();
>          for (int i=0; i < jars.length; i++) {
>              Permission p = CacheUtil.getReadPermission(jars[i].getLocation(),
>                                                         jars[i].getVersion());
> @@ -347,8 +296,8 @@
>       * Load all of the JARs used in this JNLP file into the
>       * ResourceTracker for downloading.
>       */
> -    void initializeResources() throws LaunchException {
> -        JARDesc jars[] = resources.getJARs();
> +    void initializeResources(JNLPFile file) throws LaunchException {
> +        JARDesc jars[] = file.getResources().getJARs();
>  		if (jars == null || jars.length == 0)
>  			return;
>  		/*
> @@ -357,12 +306,12 @@
>  			                    R("LCInit"), R("LFatalVerification"), "No jars!");
>  		}
>  		*/
> -        List initialJars = new ArrayList();
> +        List<JARDesc> initialJars = new ArrayList<JARDesc>();
>  
>          for (int i=0; i < jars.length; i++) {
>  
> +            addUrlToJnlpFileMapping(jars[i].getLocation().toString(), file);
>              available.add(jars[i]);
> -
>              if (jars[i].isEager())
>                  initialJars.add(jars[i]); // regardless of part
>  
> @@ -397,7 +346,7 @@
>  
>  				//user does not trust this publisher
>  				if (!js.getAlreadyTrustPublisher()) {
> -				    checkTrustWithUser(js);
> +				    checkTrustWithUser(js, file);
>  				} else {
>  					/**
>  					 * If the user trusts this publisher (i.e. the publisher's certificate
> @@ -415,7 +364,7 @@
>          activateJars(initialJars);
>      }
>  
> -    private void checkTrustWithUser(JarSigner js) throws LaunchException {
> +    private void checkTrustWithUser(JarSigner js, JNLPFile file) throws LaunchException {
>          if (!js.getRootInCacerts()) { //root cert is not in cacerts
>              boolean b = SecurityWarningDialog.showCertWarningDialog(
>                  SecurityWarningDialog.AccessType.UNVERIFIED, file, js);
> @@ -443,7 +392,7 @@
>       * loaded from the codebase are not cached.
>       */
>      public void enableCodeBase() {
> -        addURL( file.getCodeBase() ); // nothing happens if called more that once?
> +        addURL( mainJnlp.getCodeBase() ); // nothing happens if called more that once?
>      }
>  
>      /**
> @@ -472,7 +421,7 @@
>       * Returns the JNLP file the classloader was created from.
>       */
>      public JNLPFile getJNLPFile() {
> -        return file;
> +        return mainJnlp;
>      }
>  
>      /**
> @@ -485,20 +434,26 @@
>          // access w/o security dialog once we actually check certificates.
>  
>          // copy security permissions from SecurityDesc element
> -	 if (security != null) {
> +	 if (security.size() != 0) {
>              // Security desc. is used only to track security settings for the
>              // application. However, an application may comprise of multiple
>              // jars, and as such, security must be evaluated on a per jar basis.
> -            
> +
> +            JNLPFile file = getJnlpFileForUrl(cs.getLocation().toString());
> +
> +            if (JNLPRuntime.isDebug()) {
> +                System.out.println("Reading security settings for " + cs.getLocation().toString() + " using " + file.getSourceLocation());
> +            }
> +
>              // set default perms
> -            PermissionCollection permissions = security.getSandBoxPermissions();
> +            PermissionCollection permissions = security.get(file).getSandBoxPermissions();
>              
>              // If more than default is needed, evaluate based on codesource
> -            if (security.getSecurityType().equals(SecurityDesc.ALL_PERMISSIONS) ||
> -                security.getSecurityType().equals(SecurityDesc.J2EE_PERMISSIONS)) {
> +            if (security.get(file).getSecurityType().equals(SecurityDesc.ALL_PERMISSIONS) ||
> +                security.get(file).getSecurityType().equals(SecurityDesc.J2EE_PERMISSIONS)) {
>  
>                  if (cs.getCodeSigners() != null) {
> -                    permissions = security.getPermissions();
> +                    permissions = security.get(file).getPermissions();
>                  }
>              }
>  
> @@ -509,7 +464,7 @@
>  
>          // add in permission to read the cached JAR files
>          for (int i=0; i < resourcePermissions.size(); i++)
> -            result.add((Permission) resourcePermissions.get(i));
> +            result.add(resourcePermissions.get(i));
>  
>          // add in the permissions that the user granted.
>          for (int i=0; i < runtimePermissions.size(); i++)
> @@ -527,12 +482,12 @@
>       * to be loaded at the same time as the JARs specified (ie, are
>       * in the same part).
>       */
> -    protected void fillInPartJars(List jars) {
> +    protected void fillInPartJars(List<JARDesc> jars) {
>          for (int i=0; i < jars.size(); i++) {
> -            String part = ((JARDesc) jars.get(i)).getPart();
> +            String part = jars.get(i).getPart();
>  
>              for (int a=0; a < available.size(); a++) {
> -                JARDesc jar = (JARDesc) available.get(a);
> +                JARDesc jar = available.get(a);
>  
>                  if (part != null && part.equals(jar.getPart()))
>                      if (!jars.contains(jar))
> @@ -549,24 +504,25 @@
>       *
>       * @param jars the list of jars to load
>       */
> -    protected void activateJars(final List jars) {
> -        PrivilegedAction activate = new PrivilegedAction() {
> +    protected void activateJars(final List<JARDesc> jars) {
> +        PrivilegedAction<Object> activate = new PrivilegedAction<Object>() {
>  
>              public Object run() {
>                  // transfer the Jars
>                  waitForJars(jars);
>  
>                  for (int i=0; i < jars.size(); i++) {
> -                    JARDesc jar = (JARDesc) jars.get(i);
> +                    JARDesc jar = jars.get(i);
>  
>                      available.remove(jar);
> -
>                      // add jar
>                      File localFile = tracker.getCacheFile(jar.getLocation());
>                      try {
>                          URL location = jar.getLocation(); // non-cacheable, use source location
>                          if (localFile != null) {
>                              location = localFile.toURL(); // cached file
> +                            JNLPFile fileForJar = getJnlpFileForUrl(jar.getLocation().toString());
> +                            addUrlToJnlpFileMapping(location.toString(), fileForJar);
>                              
>                              // This is really not the best way.. but we need some way for 
>                              // PluginAppletViewer::getCachedImageRef() to check if the image 
> @@ -610,10 +566,12 @@
>                                      signer.verifyJar(extractedJarLocation);
>  
>                                      if (signer.anyJarsSigned() && !signer.getAlreadyTrustPublisher()) {
> -                                        checkTrustWithUser(signer);
> +                                        checkTrustWithUser(signer, fileForJar);
>                                      }
>  
>                                      try {
> +                                        addUrlToJnlpFileMapping(new URL("file://" + extractedJarLocation).toString(), 
> +                                                getJnlpFileForUrl(jar.getLocation().toString()));
>                                          addURL(new URL("file://" + extractedJarLocation));
>                                      } catch (MalformedURLException mfue) {
>                                          if (JNLPRuntime.isDebug())
> @@ -724,64 +682,25 @@
>  
>          if (!nativeDir.mkdirs()) 
>              return null;
> -        else {
> -            // add this new native directory to the search path
> -            addNativeDirectory(nativeDir);
> +        else
>              return nativeDir;
> -        }
> -    }
> -
> -    /**
> -     * Adds the {@link File} to the search path of this {@link JNLPClassLoader}
> -     * when trying to find a native library
> -     */
> -    protected void addNativeDirectory(File nativeDirectory) {
> -        nativeDirectories.add(nativeDirectory);
> -    }
> -
> -    /**
> -     * Returns a list of all directories in the search path of the current classloader
> -     * when it tires to find a native library.
> -     * @return a list of directories in the search path for native libraries
> -     */
> -    protected List<File> getNativeDirectories() {
> -        return nativeDirectories;
>      }
>  
>      /**
>       * Return the absolute path to the native library.
>       */
>      protected String findLibrary(String lib) {
> +        if (nativeDir == null)
> +            return null;
> +
>          String syslib = System.mapLibraryName(lib);
>  
> -        for (File dir: getNativeDirectories()) {
> -            File target = new File(dir, syslib);
> -            if (target.exists())
> -                return target.toString();
> +        File target = new File(nativeDir, syslib);
> +        if (target.exists())
> +            return target.toString();
> +        else {
> +            return super.findLibrary(lib);
>          }
> -
> -        String result = super.findLibrary(lib);
> -        if (result != null)
> -            return result;
> -
> -        return findLibraryExt(lib);
> -    }
> -
> -    /**
> -     * Try to find the library path from another peer classloader.
> -     */
> -    protected String findLibraryExt(String lib) {
> -        for (int i=0; i < loaders.length; i++) {
> -            String result = null;
> -
> -            if (loaders[i] != this)
> -                result = loaders[i].findLibrary(lib);
> -
> -            if (result != null)
> -                return result;
> -        }
> -
> -        return null;
>      }
>  
>      /**
> @@ -790,16 +709,16 @@
>       *
>       * @param jars the jars
>       */
> -    private void waitForJars(List jars) {
> +    private void waitForJars(List<JARDesc> jars) {
>          URL urls[] = new URL[jars.size()];
>  
>          for (int i=0; i < jars.size(); i++) {
> -            JARDesc jar = (JARDesc) jars.get(i);
> +            JARDesc jar = jars.get(i);
>  
>              urls[i] = jar.getLocation();
>          }
>  
> -        CacheUtil.waitForResources(app, tracker, urls, file.getTitle());
> +        CacheUtil.waitForResources(app, tracker, urls, mainJnlp.getTitle());
>      }
>  
>      /**
> @@ -817,20 +736,8 @@
>      /**
>       * Find the loaded class in this loader or any of its extension loaders.
>       */
> -    protected Class findLoadedClassAll(String name) {
> -        for (int i=0; i < loaders.length; i++) {
> -            Class result = null;
> -
> -            if (loaders[i] == this)
> -                result = super.findLoadedClass(name);
> -            else
> -                result = loaders[i].findLoadedClassAll(name);
> -
> -            if (result != null)
> -                return result;
> -        }
> -
> -        return null;
> +    protected Class<?> findLoadedClassAll(String name) {
> +        return super.findLoadedClass(name);
>      }
>  
>      /**
> @@ -838,9 +745,9 @@
>       * classloader, or one of the classloaders for the JNLP file's
>       * extensions.
>       */
> -    public Class loadClass(String name) throws ClassNotFoundException {
> +    public Class<?> loadClass(String name) throws ClassNotFoundException {
>  
> -        Class result = findLoadedClassAll(name);
> +        Class<?> result = findLoadedClassAll(name);
>  
>          // try parent classloader
>          if (result == null) {
> @@ -874,7 +781,7 @@
>                          for (String jarName: jarList) {
>                              JARDesc desc;
>                              try {
> -                                desc = new JARDesc(new URL(file.getCodeBase(), jarName),
> +                                desc = new JARDesc(new URL(mainJnlp.getCodeBase(), jarName),
>                                          null, null, false, true, false, true);
>                              } catch (MalformedURLException mfe) {
>                                  throw new ClassNotFoundException(name);
> @@ -889,7 +796,7 @@
>  
>                              URL remoteURL;
>                              try {
> -                                remoteURL = new URL(file.getCodeBase() + jarName);
> +                                remoteURL = new URL(mainJnlp.getCodeBase() + jarName);
>                              } catch (MalformedURLException mfe) {
>                                  throw new ClassNotFoundException(name);
>                              }
> @@ -916,32 +823,13 @@
>          return result;
>      }
>  
> -    /**
> -     * Find the class in this loader or any of its extension loaders.
> -     */
> -    protected Class findClass(String name) throws ClassNotFoundException {
> -        for (int i=0; i < loaders.length; i++) {
> -            try {
> -                if (loaders[i] == this)
> -                    return super.findClass(name);
> -                else
> -                    return loaders[i].findClass(name);
> -            }
> -            catch(ClassNotFoundException ex) { }
> -            catch(ClassFormatError cfe) {}
> -        }
> -
> -        throw new ClassNotFoundException(name);
> -    }
>  
>      /**
>       * Search for the class by incrementally adding resources to the
>       * classloader and its extension classloaders until the resource
>       * is found.
>       */
> -    private Class loadClassExt(String name) throws ClassNotFoundException {
> -        // make recursive
> -        addAvailable();
> +    private Class<?> loadClassExt(String name) throws ClassNotFoundException {
>  
>          // find it
>          try {
> @@ -970,33 +858,19 @@
>       * class loaders.
>       */
>      public URL getResource(String name) {
> -        URL result = super.getResource(name);
> -
> -        for (int i=1; i < loaders.length; i++)
> -            if (result == null)
> -                result = loaders[i].getResource(name);
> -
> -        return result;
> +        return super.getResource(name);
>      }
>  
>      /**
>       * Finds the resource in this, the parent, or the extension
>       * class loaders.
>       */
> -    public Enumeration findResources(String name) throws IOException {
> -        Vector resources = new Vector();
> +    public Enumeration<URL> findResources(String name) throws IOException {
> +        Vector<URL> resources = new Vector<URL>();
>  
> -        for (int i=0; i < loaders.length; i++) {
> -            Enumeration e;
> -
> -            if (loaders[i] == this)
> -                e = super.findResources(name);
> -            else 
> -                e = loaders[i].findResources(name);
> -
> -            while (e.hasMoreElements())
> -                resources.add(e.nextElement());
> -        }
> +        Enumeration<URL> e = super.findResources(name);
> +        while (e.hasMoreElements())
> +            resources.add(e.nextElement());
>  
>          return resources.elements();
>      }
> @@ -1012,19 +886,6 @@
>      }
>  
>      /**
> -     * Adds whatever resources have already been downloaded in the
> -     * background.
> -     */
> -    protected void addAvailable() {
> -        // go through available, check tracker for it and all of its
> -        // part brothers being available immediately, add them.
> -
> -        for (int i=1; i < loaders.length; i++) {
> -            loaders[i].addAvailable();
> -        }
> -    }
> -
> -    /**
>       * Adds the next unused resource to the classloader.  That
>       * resource and all those in the same part will be downloaded
>       * and added to the classloader before returning.  If there are
> @@ -1034,58 +895,46 @@
>       */
>      protected JNLPClassLoader addNextResource() {
>          if (available.size() == 0) {
> -            for (int i=1; i < loaders.length; i++) {
> -                JNLPClassLoader result = loaders[i].addNextResource();
> -
> -                if (result != null)
> -                    return result;
> -            }
>              return null;
>          }
>  
>          // add jar
> -        List jars = new ArrayList();
> +        List<JARDesc> jars = new ArrayList<JARDesc>();
>          jars.add(available.get(0));
>  
>          fillInPartJars(jars);
> -
> -		
>  		activateJars(jars);
>  
>          return this;
>      }
>  
> -    // this part compatibility with previous classloader
> -    /**
> -     * @deprecated
> -     */
> -    public String getExtensionName() {
> -        String result = file.getInformation().getTitle();
> -
> -        if (result == null)
> -            result = file.getInformation().getDescription();
> -        if (result == null && file.getFileLocation() != null)
> -            result = file.getFileLocation().toString();
> -        if (result == null && file.getCodeBase() != null)
> -            result = file.getCodeBase().toString();
> -
> -        return result;
> -    }
> -
> -    /**
> -     * @deprecated
> -     */
> -    public String getExtensionHREF() {
> -        return file.getFileLocation().toString();
> -    }
> -
>  	public boolean getSigning() {
>  		return signing;
>  	}
>  
> -	protected SecurityDesc getSecurity() {
> +	private Map<JNLPFile, SecurityDesc> getSecurity() {
>  		return security;
>  	}
> +
> +    private void addUrlToJnlpFileMapping(String url, JNLPFile theFile) {
> +        if (JNLPRuntime.isDebug()) {
> +            System.out.println("Adding mapping: " + url + " -> " + theFile.toString());
> +        }
> +        urlToJnlp.put(url, theFile);
> +    }
> +
> +    private JNLPFile getJnlpFileForUrl(String url) {
> +        if (JNLPRuntime.isDebug()) {
> +            System.out.println("Getting mapping for : " + url);
> +        }
> +        
> +        if (mainJnlp.isApplet()) {
> +            return mainJnlp;
> +        }
> +        
> +        return urlToJnlp.get(url);
> +    }
> +
>  }
>  
>  




More information about the distro-pkg-dev mailing list