[RFC] JNLP: jars with native libraries in incorrect locations
Andrew John Hughes
ahughes at redhat.com
Wed Jun 23 14:54:03 PDT 2010
On 14:00 Wed 23 Jun , Omair Majid wrote:
> On 06/22/2010 06:22 PM, Andrew John Hughes wrote:
> > On 22 June 2010 22:08, Omair Majid<omajid at redhat.com> wrote:
> >> On 06/22/2010 04:47 PM, Andrew John Hughes wrote:
> >>>
> >>> On 22 June 2010 19:06, Omair Majid<omajid at redhat.com> wrote:
> >>>>
> >>>> On 06/15/2010 09:42 AM, Omair Majid wrote:
> >>>>>
> >>>>> Hi,
> >>>>>
> >>>>> I recently ran into a problem with SweetHome3D [1] not working under
> >>>>> Netx. The jnlp file contains no 'nativelib' elements which initially led
> >>>>> me to believe that it contains no native code. However, one of the jars
> >>>>> it references [2] contains native code under /linux/x64/. Both of these
> >>>>> things (no nativelib element and placing .so's anywhere other than under
> >>>>> /) seem to go against the developer guide's guidelines. Of course,
> >>>>> without reading the JSR, I can not say if this is against the JNLP spec
> >>>>> or not.
> >>>>>
> >>>>> That said, since the Sun/Oracle Webstart works with SweetHome3D, Netx
> >>>>> should work too. The attached patch modifies Netx so that it always
> >>>>> tries to look for .so's (placed anywhere) in jar files. If it finds
> >>>>> them, it activates them as if the .so's were in a nativelib jar.
> >>>>>
> >>>>> Any thoughts or comments?
> >>>>>
> >>>>> Cheers,
> >>>>> Omair
> >>>>>
> >>>>>
> >>>>> [1] http://www.sweethome3d.com/SweetHome3D.jnlp
> >>>>> [2] http://www.sweethome3d.com/lib/linux/x64/java3d.jar
> >>>>
> >>>> Anyone?
> >>>>
> >>>
> >>> Sorry, didn't see this until your ping.
> >>>
> >>> The code you have to find the file component of the path could be more
> >>> portably written as new File(e.getName()).getName():
> >>> http://java.sun.com/j2se/1.5.0/docs/api/java/io/File.html#getName%28%29
> >>> That also deals with the issue of the path ending in a '/', which
> >>> would currently result in an IndexOutOfBoundsException.
> >>>
> >>
> >> Ah, that sounds just like what I was looking for. Thanks. Still, this code
> >> only executes if the entry is not a directory, so the exception should never
> >> happen (at least on a unix-like system). But your way makes a lot more sense
> >> :)
> >>
> >>> Sadly I can't see a method for obtaining the dynamic library name
> >>> extension (System has mapLibraryName to do x -> x.so, but nothing to
> >>> check an existing path; maybe something to suggest upstream).
> >>> Checking for .so, .dll and .dylib should cover most cases.
> >>>
> >>
> >> Yup, I was hoping to find something in the JRE to check for a library name
> >> but couldn't. I guess I will manually add checks for .so, .dll and .dylib.
> >> Do you know of any reference where I could find a list of possible
> >> extensions? I ask because I have never seen .dylib before, and I would hate
> >> to miss other possible library extensions.
> >>
> >
> > There's http://en.wikipedia.org/wiki/Dynamic_libraries#Naming
> >
> > Most systems are .so (GNU/Linux, Solaris, *BSD). The exceptions are
> > MacOS X which renames them to .dylib (though they are essentially the
> > same thing) and also has bundles of them which we should also probably
> > allow for (.framework as mentioned in the link), along with Windows
> > which uses the .dll system as it always has to be different.
> >
>
> I added ".so", ".dylib", ".jnilib", ".framework" and ".dll". Apple's JNI
> documentation suggests they prefer people using jnilib for JNI libraries.
>
> >> More importantly, can I take this to mean that violating (what I think is)
> >> the spec is ok in this case?
> >>
> >
> > I'd say their proprietary implementation is the spec. for all intents
> > and purposes, and if it works with that so be it.
> >
>
> How about this version of the patch?
>
Looks good. I like the 1.5 updates too; there's a lot of that needs fixing in NetX
from what I've seen. I assume nativeCounter is an unused variable?
> Thanks,
> Omair
> diff -r da2ba8396450 netx/net/sourceforge/jnlp/SecurityDesc.java
> --- a/netx/net/sourceforge/jnlp/SecurityDesc.java Tue Jun 22 19:14:32 2010 +0100
> +++ b/netx/net/sourceforge/jnlp/SecurityDesc.java Wed Jun 23 13:55:11 2010 -0400
> @@ -31,12 +31,9 @@
> */
> public class SecurityDesc {
>
> - // todo: make sure classloader's native code support checks
> - // the security permissions
> -
> - // shouldn't need to verify that native code only runs in
> - // trusted environment because the parser and/or classloader
> - // should kick it.
> + /*
> + * We do not verify security here, the classloader deals with security
> + */
>
> /** All permissions. */
> public static final Object ALL_PERMISSIONS = "All";
> diff -r da2ba8396450 netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
> --- a/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Tue Jun 22 19:14:32 2010 +0100
> +++ b/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Wed Jun 23 13:55:11 2010 -0400
> @@ -80,9 +80,6 @@
> /** map from JNLPFile url to shared classloader */
> private static Map urlToLoader = new HashMap(); // never garbage collected!
>
> - /** number of times a classloader with native code is created */
> - private static int nativeCounter = 0;
> -
> /** the directory for native code */
> private File nativeDir = null; // if set, some native code exists
>
> @@ -642,8 +639,8 @@
> ex.printStackTrace();
> }
>
> - if (jar.isNative())
> - activateNative(jar);
> + // some programs place a native library in any jar
> + activateNative(jar);
> }
>
> return null;
> @@ -654,9 +651,9 @@
> }
>
> /**
> - * Enable the native code contained in a JAR by copying the
> - * native files into the filesystem. Called in the security
> - * context of the classloader.
> + * Search for and enable any native code contained in a JAR by copying the
> + * native files into the filesystem. Called in the security context of the
> + * classloader.
> */
> protected void activateNative(JARDesc jar) {
> if (JNLPRuntime.isDebug())
> @@ -669,17 +666,33 @@
> if (nativeDir == null)
> nativeDir = getNativeDir();
>
> + String[] librarySuffixes = { ".so", ".dylib", ".jnilib", ".framework", ".dll" };
> +
> try {
> JarFile jarFile = new JarFile(localFile, false);
> - Enumeration entries = jarFile.entries();
> + Enumeration<JarEntry> entries = jarFile.entries();
>
> while (entries.hasMoreElements()) {
> - JarEntry e = (JarEntry) entries.nextElement();
> + JarEntry e = entries.nextElement();
>
> - if (e.isDirectory() || e.getName().indexOf('/') != -1)
> + if (e.isDirectory()) {
> continue;
> + }
>
> - File outFile = new File(nativeDir, e.getName());
> + String name = new File(e.getName()).getName();
> + boolean isLibrary = false;
> +
> + for (String suffix: librarySuffixes) {
> + if (name.endsWith(suffix)) {
> + isLibrary = true;
> + break;
> + }
> + }
> + if (!isLibrary) {
> + continue;
> + }
> +
> + File outFile = new File(nativeDir, name);
>
> CacheUtil.streamCopy(jarFile.getInputStream(e),
> new FileOutputStream(outFile));
--
Andrew :)
Free Java Software Engineer
Red Hat, Inc. (http://www.redhat.com)
Support Free Java!
Contribute to GNU Classpath and the OpenJDK
http://www.gnu.org/software/classpath
http://openjdk.java.net
PGP Key: 94EFD9D8 (http://subkeys.pgp.net)
Fingerprint = F8EF F1EA 401E 2E60 15FA 7927 142C 2591 94EF D9D8
More information about the distro-pkg-dev
mailing list