container format for jigsaw modules

Roger Riggs Roger.Riggs at Sun.COM
Thu Nov 12 12:25:23 PST 2009


Hi,

A couple of comments:

1) I don't see requirements related to security except for hashes that  
allow
checking of the integrity of the container and contents.
The Java security mechanisms are in most cases based on authentication  
of the source
of the class files that can be verified using pki (signed JARs in the  
current system.)
There should be a requirement to be able to verify the contents as  
various levels.
The granularity should be variable to match the components extracted  
and used from
the container.

2) To allow dynamic loading of dependencies each container should be  
able to
include the URI/URL of the other modules it depends on.  In a lightly  
administered
application, the URLs can be used directly to download missing  
dependencies.
In a more controlled environment the URIs can be used to lookup where  
to find
missing dependencies.  Another alternative would be identify only the  
URL
of a service that would provide the modules.

3) In JavaME, small application descriptors were used to be able to  
download the meta-data
for an application/library. It is possible to download the descriptors  
ahead of the bulk
of the application's JARs and libraries and be able to verify  
dependencies and whether
the components are already present.  It is an opportunity to eliminate  
transfers when they
are not needed.  The key information need to be sufficient to validate  
the dependencies
are or are not met with current modules.  This allows the entire graph  
to be checked before
downloading the bulk of the data.

4) Have you considered being able to use RTSP (Streaming protocol) for  
the transport.
Though it is typically associated more with media than application  
delivery it supports random access.

I'll have to take a look at XAR and see how these are handled.

Roger









More information about the jigsaw-dev mailing list