author | alanb |
Fri, 17 Jun 2016 08:41:39 +0100 | |
changeset 39050 | 9de41b79ec7e |
parent 37779 | 7c84df693837 |
child 42338 | a60f280f803c |
permissions | -rw-r--r-- |
36511 | 1 |
/* |
2 |
* Copyright (c) 2013, 2016, Oracle and/or its affiliates. All rights reserved. |
|
3 |
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
|
4 |
* |
|
5 |
* This code is free software; you can redistribute it and/or modify it |
|
6 |
* under the terms of the GNU General Public License version 2 only, as |
|
7 |
* published by the Free Software Foundation. Oracle designates this |
|
8 |
* particular file as subject to the "Classpath" exception as provided |
|
9 |
* by Oracle in the LICENSE file that accompanied this code. |
|
10 |
* |
|
11 |
* This code is distributed in the hope that it will be useful, but WITHOUT |
|
12 |
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
|
13 |
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
|
14 |
* version 2 for more details (a copy is included in the LICENSE file that |
|
15 |
* accompanied this code). |
|
16 |
* |
|
17 |
* You should have received a copy of the GNU General Public License version |
|
18 |
* 2 along with this work; if not, write to the Free Software Foundation, |
|
19 |
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
|
20 |
* |
|
21 |
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
|
22 |
* or visit www.oracle.com if you need additional information or have any |
|
23 |
* questions. |
|
24 |
*/ |
|
25 |
||
26 |
package java.lang.module; |
|
27 |
||
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
28 |
import java.io.PrintStream; |
36511 | 29 |
import java.lang.module.ModuleDescriptor.Requires.Modifier; |
30 |
import java.util.ArrayDeque; |
|
31 |
import java.util.ArrayList; |
|
32 |
import java.util.Collection; |
|
33 |
import java.util.Deque; |
|
34 |
import java.util.HashMap; |
|
35 |
import java.util.HashSet; |
|
36 |
import java.util.LinkedHashSet; |
|
37 |
import java.util.List; |
|
38 |
import java.util.Map; |
|
39 |
import java.util.Objects; |
|
40 |
import java.util.Optional; |
|
41 |
import java.util.Set; |
|
42 |
import java.util.StringJoiner; |
|
43 |
import java.util.stream.Collectors; |
|
44 |
||
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
45 |
import jdk.internal.module.ModuleHashes; |
36511 | 46 |
|
47 |
/** |
|
48 |
* The resolver used by {@link Configuration#resolveRequires} and |
|
49 |
* {@link Configuration#resolveRequiresAndUses}. |
|
50 |
*/ |
|
51 |
||
52 |
final class Resolver { |
|
53 |
||
54 |
private final ModuleFinder beforeFinder; |
|
55 |
private final Configuration parent; |
|
56 |
private final ModuleFinder afterFinder; |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
57 |
private final PrintStream traceOutput; |
36511 | 58 |
|
59 |
// maps module name to module reference |
|
60 |
private final Map<String, ModuleReference> nameToReference = new HashMap<>(); |
|
61 |
||
62 |
||
63 |
Resolver(ModuleFinder beforeFinder, |
|
64 |
Configuration parent, |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
65 |
ModuleFinder afterFinder, |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
66 |
PrintStream traceOutput) { |
36511 | 67 |
this.beforeFinder = beforeFinder; |
68 |
this.parent = parent; |
|
69 |
this.afterFinder = afterFinder; |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
70 |
this.traceOutput = traceOutput; |
36511 | 71 |
} |
72 |
||
73 |
||
74 |
/** |
|
75 |
* Resolves the given named modules. |
|
76 |
* |
|
77 |
* @throws ResolutionException |
|
78 |
*/ |
|
79 |
Resolver resolveRequires(Collection<String> roots) { |
|
80 |
||
81 |
// create the visit stack to get us started |
|
82 |
Deque<ModuleDescriptor> q = new ArrayDeque<>(); |
|
83 |
for (String root : roots) { |
|
84 |
||
85 |
// find root module |
|
86 |
ModuleReference mref = findWithBeforeFinder(root); |
|
87 |
if (mref == null) { |
|
88 |
if (parent.findModule(root).isPresent()) { |
|
89 |
// in parent, nothing to do |
|
90 |
continue; |
|
91 |
} |
|
92 |
mref = findWithAfterFinder(root); |
|
93 |
if (mref == null) { |
|
94 |
fail("Module %s not found", root); |
|
95 |
} |
|
96 |
} |
|
97 |
||
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
98 |
if (isTracing()) { |
36511 | 99 |
trace("Root module %s located", root); |
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
100 |
mref.location().ifPresent(uri -> trace(" (%s)", uri)); |
36511 | 101 |
} |
102 |
||
103 |
assert mref.descriptor().name().equals(root); |
|
104 |
nameToReference.put(root, mref); |
|
105 |
q.push(mref.descriptor()); |
|
106 |
} |
|
107 |
||
108 |
resolve(q); |
|
109 |
||
110 |
return this; |
|
111 |
} |
|
112 |
||
113 |
/** |
|
114 |
* Resolve all modules in the given queue. On completion the queue will be |
|
115 |
* empty and any resolved modules will be added to {@code nameToReference}. |
|
116 |
* |
|
117 |
* @return The set of module resolved by this invocation of resolve |
|
118 |
*/ |
|
119 |
private Set<ModuleDescriptor> resolve(Deque<ModuleDescriptor> q) { |
|
120 |
Set<ModuleDescriptor> resolved = new HashSet<>(); |
|
121 |
||
122 |
while (!q.isEmpty()) { |
|
123 |
ModuleDescriptor descriptor = q.poll(); |
|
124 |
assert nameToReference.containsKey(descriptor.name()); |
|
125 |
||
126 |
// process dependences |
|
127 |
for (ModuleDescriptor.Requires requires : descriptor.requires()) { |
|
128 |
String dn = requires.name(); |
|
129 |
||
130 |
// find dependence |
|
131 |
ModuleReference mref = findWithBeforeFinder(dn); |
|
132 |
if (mref == null) { |
|
133 |
if (parent.findModule(dn).isPresent()) |
|
134 |
continue; |
|
135 |
||
136 |
mref = findWithAfterFinder(dn); |
|
137 |
if (mref == null) { |
|
138 |
fail("Module %s not found, required by %s", |
|
139 |
dn, descriptor.name()); |
|
140 |
} |
|
141 |
} |
|
142 |
||
143 |
if (!nameToReference.containsKey(dn)) { |
|
144 |
nameToReference.put(dn, mref); |
|
145 |
q.offer(mref.descriptor()); |
|
146 |
resolved.add(mref.descriptor()); |
|
147 |
||
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
148 |
if (isTracing()) { |
36511 | 149 |
trace("Module %s located, required by %s", |
150 |
dn, descriptor.name()); |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
151 |
mref.location().ifPresent(uri -> trace(" (%s)", uri)); |
36511 | 152 |
} |
153 |
} |
|
154 |
||
155 |
} |
|
156 |
||
157 |
resolved.add(descriptor); |
|
158 |
} |
|
159 |
||
160 |
return resolved; |
|
161 |
} |
|
162 |
||
163 |
/** |
|
164 |
* Augments the set of resolved modules with modules induced by the |
|
165 |
* service-use relation. |
|
166 |
*/ |
|
167 |
Resolver resolveUses() { |
|
168 |
||
169 |
// Scan the finders for all available service provider modules. As |
|
170 |
// java.base uses services then then module finders will be scanned |
|
171 |
// anyway. |
|
172 |
Map<String, Set<ModuleReference>> availableProviders = new HashMap<>(); |
|
173 |
for (ModuleReference mref : findAll()) { |
|
174 |
ModuleDescriptor descriptor = mref.descriptor(); |
|
175 |
if (!descriptor.provides().isEmpty()) { |
|
176 |
||
177 |
for (String sn : descriptor.provides().keySet()) { |
|
178 |
// computeIfAbsent |
|
179 |
Set<ModuleReference> providers = availableProviders.get(sn); |
|
180 |
if (providers == null) { |
|
181 |
providers = new HashSet<>(); |
|
182 |
availableProviders.put(sn, providers); |
|
183 |
} |
|
184 |
providers.add(mref); |
|
185 |
} |
|
186 |
||
187 |
} |
|
188 |
} |
|
189 |
||
190 |
// create the visit stack |
|
191 |
Deque<ModuleDescriptor> q = new ArrayDeque<>(); |
|
192 |
||
193 |
// the initial set of modules that may use services |
|
194 |
Set<ModuleDescriptor> candidateConsumers = new HashSet<>(); |
|
195 |
Configuration p = parent; |
|
196 |
while (p != null) { |
|
197 |
candidateConsumers.addAll(p.descriptors()); |
|
198 |
p = p.parent().orElse(null); |
|
199 |
} |
|
200 |
for (ModuleReference mref : nameToReference.values()) { |
|
201 |
candidateConsumers.add(mref.descriptor()); |
|
202 |
} |
|
203 |
||
204 |
||
205 |
// Where there is a consumer of a service then resolve all modules |
|
206 |
// that provide an implementation of that service |
|
207 |
do { |
|
208 |
for (ModuleDescriptor descriptor : candidateConsumers) { |
|
209 |
if (!descriptor.uses().isEmpty()) { |
|
210 |
for (String service : descriptor.uses()) { |
|
211 |
Set<ModuleReference> mrefs = availableProviders.get(service); |
|
212 |
if (mrefs != null) { |
|
213 |
for (ModuleReference mref : mrefs) { |
|
214 |
ModuleDescriptor provider = mref.descriptor(); |
|
215 |
if (!provider.equals(descriptor)) { |
|
216 |
||
217 |
trace("Module %s provides %s, used by %s", |
|
218 |
provider.name(), service, descriptor.name()); |
|
219 |
||
220 |
String pn = provider.name(); |
|
221 |
if (!nameToReference.containsKey(pn)) { |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
222 |
if (isTracing()) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
223 |
mref.location() |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
224 |
.ifPresent(uri -> trace(" (%s)", uri)); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
225 |
} |
36511 | 226 |
nameToReference.put(pn, mref); |
227 |
q.push(provider); |
|
228 |
} |
|
229 |
} |
|
230 |
} |
|
231 |
} |
|
232 |
} |
|
233 |
} |
|
234 |
} |
|
235 |
||
236 |
candidateConsumers = resolve(q); |
|
237 |
||
238 |
} while (!candidateConsumers.isEmpty()); |
|
239 |
||
240 |
return this; |
|
241 |
} |
|
242 |
||
243 |
||
244 |
/** |
|
245 |
* Execute post-resolution checks and returns the module graph of resolved |
|
246 |
* modules as {@code Map}. The resolved modules will be in the given |
|
247 |
* configuration. |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
248 |
* |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
249 |
* @param check {@true} to execute the post resolution checks |
36511 | 250 |
*/ |
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
251 |
Map<ResolvedModule, Set<ResolvedModule>> finish(Configuration cf, |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
252 |
boolean check) |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
253 |
{ |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
254 |
if (isTracing()) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
255 |
trace("Result:"); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
256 |
Set<String> names = nameToReference.keySet(); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
257 |
names.stream().sorted().forEach(name -> trace(" %s", name)); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
258 |
} |
36511 | 259 |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
260 |
if (check) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
261 |
detectCycles(); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
262 |
checkPlatformConstraints(); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
263 |
checkHashes(); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
264 |
} |
36511 | 265 |
|
266 |
Map<ResolvedModule, Set<ResolvedModule>> graph = makeGraph(cf); |
|
267 |
||
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
268 |
if (check) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
269 |
checkExportSuppliers(graph); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
270 |
} |
36511 | 271 |
|
272 |
return graph; |
|
273 |
} |
|
274 |
||
275 |
/** |
|
276 |
* Checks the given module graph for cycles. |
|
277 |
* |
|
278 |
* For now the implementation is a simple depth first search on the |
|
279 |
* dependency graph. We'll replace this later, maybe with Tarjan. |
|
280 |
*/ |
|
281 |
private void detectCycles() { |
|
282 |
visited = new HashSet<>(); |
|
283 |
visitPath = new LinkedHashSet<>(); // preserve insertion order |
|
284 |
for (ModuleReference mref : nameToReference.values()) { |
|
285 |
visit(mref.descriptor()); |
|
286 |
} |
|
287 |
visited.clear(); |
|
288 |
} |
|
289 |
||
290 |
// the modules that were visited |
|
291 |
private Set<ModuleDescriptor> visited; |
|
292 |
||
293 |
// the modules in the current visit path |
|
294 |
private Set<ModuleDescriptor> visitPath; |
|
295 |
||
296 |
private void visit(ModuleDescriptor descriptor) { |
|
297 |
if (!visited.contains(descriptor)) { |
|
298 |
boolean added = visitPath.add(descriptor); |
|
299 |
if (!added) { |
|
300 |
throw new ResolutionException("Cycle detected: " + |
|
301 |
cycleAsString(descriptor)); |
|
302 |
} |
|
303 |
for (ModuleDescriptor.Requires requires : descriptor.requires()) { |
|
304 |
String dn = requires.name(); |
|
305 |
||
306 |
ModuleReference mref = nameToReference.get(dn); |
|
307 |
if (mref != null) { |
|
308 |
ModuleDescriptor other = mref.descriptor(); |
|
309 |
if (other != descriptor) { |
|
310 |
// dependency is in this configuration |
|
311 |
visit(other); |
|
312 |
} |
|
313 |
} |
|
314 |
} |
|
315 |
visitPath.remove(descriptor); |
|
316 |
visited.add(descriptor); |
|
317 |
} |
|
318 |
} |
|
319 |
||
320 |
/** |
|
321 |
* Returns a String with a list of the modules in a detected cycle. |
|
322 |
*/ |
|
323 |
private String cycleAsString(ModuleDescriptor descriptor) { |
|
324 |
List<ModuleDescriptor> list = new ArrayList<>(visitPath); |
|
325 |
list.add(descriptor); |
|
326 |
int index = list.indexOf(descriptor); |
|
327 |
return list.stream() |
|
328 |
.skip(index) |
|
329 |
.map(ModuleDescriptor::name) |
|
330 |
.collect(Collectors.joining(" -> ")); |
|
331 |
} |
|
332 |
||
333 |
||
334 |
/** |
|
335 |
* If there are platform specific modules then check that the OS name, |
|
336 |
* architecture and version match. |
|
337 |
* |
|
338 |
* @apiNote This method does not currently check if the OS matches |
|
339 |
* platform specific modules in parent configurations. |
|
340 |
*/ |
|
341 |
private void checkPlatformConstraints() { |
|
342 |
||
343 |
// first module encountered that is platform specific |
|
344 |
String savedModuleName = null; |
|
345 |
String savedOsName = null; |
|
346 |
String savedOsArch = null; |
|
347 |
String savedOsVersion = null; |
|
348 |
||
349 |
for (ModuleReference mref : nameToReference.values()) { |
|
350 |
ModuleDescriptor descriptor = mref.descriptor(); |
|
351 |
||
352 |
String osName = descriptor.osName().orElse(null); |
|
353 |
String osArch = descriptor.osArch().orElse(null); |
|
354 |
String osVersion = descriptor.osVersion().orElse(null); |
|
355 |
||
356 |
if (osName != null || osArch != null || osVersion != null) { |
|
357 |
||
358 |
if (savedModuleName == null) { |
|
359 |
||
360 |
savedModuleName = descriptor.name(); |
|
361 |
savedOsName = osName; |
|
362 |
savedOsArch = osArch; |
|
363 |
savedOsVersion = osVersion; |
|
364 |
||
365 |
} else { |
|
366 |
||
367 |
boolean matches = platformMatches(osName, savedOsName) |
|
368 |
&& platformMatches(osArch, savedOsArch) |
|
369 |
&& platformMatches(osVersion, savedOsVersion); |
|
370 |
||
371 |
if (!matches) { |
|
372 |
String s1 = platformAsString(savedOsName, |
|
373 |
savedOsArch, |
|
374 |
savedOsVersion); |
|
375 |
||
376 |
String s2 = platformAsString(osName, osArch, osVersion); |
|
377 |
fail("Mismatching constraints on target platform: " |
|
378 |
+ savedModuleName + ": " + s1 |
|
379 |
+ ", " + descriptor.name() + ": " + s2); |
|
380 |
} |
|
381 |
||
382 |
} |
|
383 |
||
384 |
} |
|
385 |
} |
|
386 |
||
387 |
} |
|
388 |
||
389 |
/** |
|
390 |
* Returns true if the s1 and s2 are equal or one of them is null. |
|
391 |
*/ |
|
392 |
private boolean platformMatches(String s1, String s2) { |
|
393 |
if (s1 == null || s2 == null) |
|
394 |
return true; |
|
395 |
else |
|
396 |
return Objects.equals(s1, s2); |
|
397 |
} |
|
398 |
||
399 |
/** |
|
400 |
* Return a string that encodes the OS name/arch/version. |
|
401 |
*/ |
|
402 |
private String platformAsString(String osName, |
|
403 |
String osArch, |
|
404 |
String osVersion) { |
|
405 |
||
406 |
return new StringJoiner("-") |
|
407 |
.add(Objects.toString(osName, "*")) |
|
408 |
.add(Objects.toString(osArch, "*")) |
|
409 |
.add(Objects.toString(osVersion, "*")) |
|
410 |
.toString(); |
|
411 |
||
412 |
} |
|
413 |
||
414 |
/** |
|
415 |
* Checks the hashes in the module descriptor to ensure that they match |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
416 |
* any recorded hashes. |
36511 | 417 |
*/ |
418 |
private void checkHashes() { |
|
419 |
for (ModuleReference mref : nameToReference.values()) { |
|
420 |
ModuleDescriptor descriptor = mref.descriptor(); |
|
421 |
||
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
422 |
// get map of module hashes |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
423 |
Optional<ModuleHashes> ohashes = descriptor.hashes(); |
36511 | 424 |
if (!ohashes.isPresent()) |
425 |
continue; |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
426 |
ModuleHashes hashes = ohashes.get(); |
36511 | 427 |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
428 |
String algorithm = hashes.algorithm(); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
429 |
for (String dn : hashes.names()) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
430 |
ModuleReference other = nameToReference.get(dn); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
431 |
if (other == null) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
432 |
other = parent.findModule(dn) |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
433 |
.map(ResolvedModule::reference) |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
434 |
.orElse(null); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
435 |
} |
36511 | 436 |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
437 |
// skip checking the hash if the module has been patched |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
438 |
if (other != null && !other.isPatched()) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
439 |
String recordedHash = hashes.hashFor(dn); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
440 |
String actualHash = other.computeHash(algorithm); |
36511 | 441 |
if (actualHash == null) |
442 |
fail("Unable to compute the hash of module %s", dn); |
|
443 |
if (!recordedHash.equals(actualHash)) { |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
444 |
fail("Hash of %s (%s) differs to expected hash (%s)" + |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
445 |
" recorded in %s", dn, actualHash, recordedHash, |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
446 |
descriptor.name()); |
36511 | 447 |
} |
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
448 |
} |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
449 |
} |
36511 | 450 |
|
451 |
} |
|
452 |
} |
|
453 |
||
454 |
||
455 |
/** |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
456 |
* Computes the readability graph for the modules in the given Configuration. |
36511 | 457 |
* |
458 |
* The readability graph is created by propagating "requires" through the |
|
459 |
* "public requires" edges of the module dependence graph. So if the module |
|
460 |
* dependence graph has m1 requires m2 && m2 requires public m3 then the |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
461 |
* resulting readability graph will contain m1 reads m2, m1 reads m3, and |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
462 |
* m2 reads m3. |
36511 | 463 |
*/ |
464 |
private Map<ResolvedModule, Set<ResolvedModule>> makeGraph(Configuration cf) { |
|
465 |
||
466 |
// the "reads" graph starts as a module dependence graph and |
|
467 |
// is iteratively updated to be the readability graph |
|
468 |
Map<ResolvedModule, Set<ResolvedModule>> g1 = new HashMap<>(); |
|
469 |
||
470 |
// the "requires public" graph, contains requires public edges only |
|
471 |
Map<ResolvedModule, Set<ResolvedModule>> g2 = new HashMap<>(); |
|
472 |
||
473 |
||
474 |
// need "requires public" from the modules in parent configurations as |
|
475 |
// there may be selected modules that have a dependency on modules in |
|
476 |
// the parent configuration. |
|
477 |
||
478 |
Configuration p = parent; |
|
479 |
while (p != null) { |
|
480 |
for (ModuleDescriptor descriptor : p.descriptors()) { |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
481 |
String name = descriptor.name(); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
482 |
ResolvedModule m1 = p.findModule(name) |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
483 |
.orElseThrow(() -> new InternalError(name + " not found")); |
36511 | 484 |
for (ModuleDescriptor.Requires requires : descriptor.requires()) { |
485 |
if (requires.modifiers().contains(Modifier.PUBLIC)) { |
|
486 |
String dn = requires.name(); |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
487 |
ResolvedModule m2 = p.findModule(dn) |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
488 |
.orElseThrow(() -> new InternalError(dn + " not found")); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
489 |
g2.computeIfAbsent(m1, k -> new HashSet<>()).add(m2); |
36511 | 490 |
} |
491 |
} |
|
492 |
} |
|
493 |
||
494 |
p = p.parent().orElse(null); |
|
495 |
} |
|
496 |
||
497 |
// populate g1 and g2 with the dependences from the selected modules |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
498 |
|
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
499 |
Map<String, ResolvedModule> nameToResolved = new HashMap<>(); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
500 |
|
36511 | 501 |
for (ModuleReference mref : nameToReference.values()) { |
502 |
ModuleDescriptor descriptor = mref.descriptor(); |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
503 |
String name = descriptor.name(); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
504 |
|
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
505 |
ResolvedModule m1 = computeIfAbsent(nameToResolved, name, cf, mref); |
36511 | 506 |
|
507 |
Set<ResolvedModule> reads = new HashSet<>(); |
|
508 |
Set<ResolvedModule> requiresPublic = new HashSet<>(); |
|
509 |
||
510 |
for (ModuleDescriptor.Requires requires : descriptor.requires()) { |
|
511 |
String dn = requires.name(); |
|
512 |
||
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
513 |
ResolvedModule m2; |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
514 |
ModuleReference mref2 = nameToReference.get(dn); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
515 |
if (mref2 != null) { |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
516 |
// same configuration |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
517 |
m2 = computeIfAbsent(nameToResolved, dn, cf, mref2); |
36511 | 518 |
} else { |
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
519 |
// parent configuration |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
520 |
m2 = parent.findModule(dn).orElse(null); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
521 |
if (m2 == null) { |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
522 |
continue; |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
523 |
} |
36511 | 524 |
} |
525 |
||
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
526 |
// m1 requires m2 => m1 reads m2 |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
527 |
reads.add(m2); |
36511 | 528 |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
529 |
// m1 requires public m2 |
36511 | 530 |
if (requires.modifiers().contains(Modifier.PUBLIC)) { |
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
531 |
requiresPublic.add(m2); |
36511 | 532 |
} |
533 |
||
534 |
} |
|
535 |
||
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
536 |
// automatic modules read all selected modules and all modules |
36511 | 537 |
// in parent configurations |
538 |
if (descriptor.isAutomatic()) { |
|
539 |
||
540 |
// reads all selected modules |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
541 |
// `requires public` all selected automatic modules |
36511 | 542 |
for (ModuleReference mref2 : nameToReference.values()) { |
543 |
ModuleDescriptor descriptor2 = mref2.descriptor(); |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
544 |
String name2 = descriptor2.name(); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
545 |
|
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
546 |
if (!name.equals(name2)) { |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
547 |
ResolvedModule m2 |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
548 |
= computeIfAbsent(nameToResolved, name2, cf, mref2); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
549 |
reads.add(m2); |
36511 | 550 |
if (descriptor2.isAutomatic()) |
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
551 |
requiresPublic.add(m2); |
36511 | 552 |
} |
553 |
} |
|
554 |
||
555 |
// reads all modules in parent configurations |
|
556 |
// `requires public` all automatic modules in parent configurations |
|
557 |
p = parent; |
|
558 |
while (p != null) { |
|
559 |
for (ResolvedModule m : p.modules()) { |
|
560 |
reads.add(m); |
|
561 |
if (m.reference().descriptor().isAutomatic()) |
|
562 |
requiresPublic.add(m); |
|
563 |
} |
|
564 |
p = p.parent().orElse(null); |
|
565 |
} |
|
566 |
||
567 |
} |
|
568 |
||
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
569 |
g1.put(m1, reads); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
570 |
g2.put(m1, requiresPublic); |
36511 | 571 |
} |
572 |
||
573 |
// Iteratively update g1 until there are no more requires public to propagate |
|
574 |
boolean changed; |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
575 |
Set<ResolvedModule> toAdd = new HashSet<>(); |
36511 | 576 |
do { |
577 |
changed = false; |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
578 |
for (Set<ResolvedModule> m1Reads : g1.values()) { |
36511 | 579 |
for (ResolvedModule m2 : m1Reads) { |
580 |
Set<ResolvedModule> m2RequiresPublic = g2.get(m2); |
|
581 |
if (m2RequiresPublic != null) { |
|
582 |
for (ResolvedModule m3 : m2RequiresPublic) { |
|
583 |
if (!m1Reads.contains(m3)) { |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
584 |
// m1 reads m2, m2 requires public m3 |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
585 |
// => need to add m1 reads m3 |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
586 |
toAdd.add(m3); |
36511 | 587 |
} |
588 |
} |
|
589 |
} |
|
590 |
} |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
591 |
if (!toAdd.isEmpty()) { |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
592 |
m1Reads.addAll(toAdd); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
593 |
toAdd.clear(); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
594 |
changed = true; |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
595 |
} |
36511 | 596 |
} |
597 |
} while (changed); |
|
598 |
||
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
599 |
return g1; |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
600 |
} |
36511 | 601 |
|
39050
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
602 |
/** |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
603 |
* Equivalent to |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
604 |
* <pre>{@code |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
605 |
* map.computeIfAbsent(name, k -> new ResolvedModule(cf, mref)) |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
606 |
* </pre>} |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
607 |
*/ |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
608 |
private ResolvedModule computeIfAbsent(Map<String, ResolvedModule> map, |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
609 |
String name, |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
610 |
Configuration cf, |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
611 |
ModuleReference mref) |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
612 |
{ |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
613 |
ResolvedModule m = map.get(name); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
614 |
if (m == null) { |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
615 |
m = new ResolvedModule(cf, mref); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
616 |
map.put(name, m); |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
617 |
} |
9de41b79ec7e
8158456: ModuleDescriptor.read does not verify dependence on java.base in module-info.class
alanb
parents:
37779
diff
changeset
|
618 |
return m; |
36511 | 619 |
} |
620 |
||
621 |
||
622 |
/** |
|
623 |
* Checks the readability graph to ensure that no two modules export the |
|
624 |
* same package to a module. This includes the case where module M has |
|
625 |
* a local package P and M reads another module that exports P to M. |
|
626 |
* Also checks the uses/provides of module M to ensure that it reads a |
|
627 |
* module that exports the package of the service type to M. |
|
628 |
*/ |
|
629 |
private void checkExportSuppliers(Map<ResolvedModule, Set<ResolvedModule>> graph) { |
|
630 |
||
631 |
for (Map.Entry<ResolvedModule, Set<ResolvedModule>> e : graph.entrySet()) { |
|
632 |
ModuleDescriptor descriptor1 = e.getKey().descriptor(); |
|
633 |
||
634 |
// the map of packages that are local or exported to descriptor1 |
|
635 |
Map<String, ModuleDescriptor> packageToExporter = new HashMap<>(); |
|
636 |
||
637 |
// local packages |
|
638 |
Set<String> packages = descriptor1.packages(); |
|
639 |
for (String pn : packages) { |
|
640 |
packageToExporter.put(pn, descriptor1); |
|
641 |
} |
|
642 |
||
643 |
// descriptor1 reads descriptor2 |
|
644 |
Set<ResolvedModule> reads = e.getValue(); |
|
645 |
for (ResolvedModule endpoint : reads) { |
|
646 |
ModuleDescriptor descriptor2 = endpoint.descriptor(); |
|
647 |
||
648 |
for (ModuleDescriptor.Exports export : descriptor2.exports()) { |
|
649 |
||
650 |
if (export.isQualified()) { |
|
651 |
if (!export.targets().contains(descriptor1.name())) |
|
652 |
continue; |
|
653 |
} |
|
654 |
||
655 |
// source is exported to descriptor2 |
|
656 |
String source = export.source(); |
|
657 |
ModuleDescriptor other |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
658 |
= packageToExporter.put(source, descriptor2); |
36511 | 659 |
|
660 |
if (other != null && other != descriptor2) { |
|
661 |
// package might be local to descriptor1 |
|
662 |
if (other == descriptor1) { |
|
663 |
fail("Module %s contains package %s" |
|
664 |
+ ", module %s exports package %s to %s", |
|
665 |
descriptor1.name(), |
|
666 |
source, |
|
667 |
descriptor2.name(), |
|
668 |
source, |
|
669 |
descriptor1.name()); |
|
670 |
} else { |
|
671 |
fail("Modules %s and %s export package %s to module %s", |
|
672 |
descriptor2.name(), |
|
673 |
other.name(), |
|
674 |
source, |
|
675 |
descriptor1.name()); |
|
676 |
} |
|
677 |
||
678 |
} |
|
679 |
} |
|
680 |
} |
|
681 |
||
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
682 |
// uses/provides checks not applicable to automatic modules |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
683 |
if (!descriptor1.isAutomatic()) { |
36511 | 684 |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
685 |
// uses S |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
686 |
for (String service : descriptor1.uses()) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
687 |
String pn = packageName(service); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
688 |
if (!packageToExporter.containsKey(pn)) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
689 |
fail("Module %s does not read a module that exports %s", |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
690 |
descriptor1.name(), pn); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
691 |
} |
36511 | 692 |
} |
693 |
||
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
694 |
// provides S |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
695 |
for (Map.Entry<String, ModuleDescriptor.Provides> entry : |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
696 |
descriptor1.provides().entrySet()) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
697 |
String service = entry.getKey(); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
698 |
ModuleDescriptor.Provides provides = entry.getValue(); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
699 |
|
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
700 |
String pn = packageName(service); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
701 |
if (!packageToExporter.containsKey(pn)) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
702 |
fail("Module %s does not read a module that exports %s", |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
703 |
descriptor1.name(), pn); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
704 |
} |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
705 |
|
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
706 |
for (String provider : provides.providers()) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
707 |
if (!packages.contains(packageName(provider))) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
708 |
fail("Provider %s not in module %s", |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
709 |
provider, descriptor1.name()); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
710 |
} |
36511 | 711 |
} |
712 |
} |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
713 |
|
36511 | 714 |
} |
715 |
||
716 |
} |
|
717 |
||
718 |
} |
|
719 |
||
720 |
||
721 |
/** |
|
722 |
* Invokes the beforeFinder to find method to find the given module. |
|
723 |
*/ |
|
724 |
private ModuleReference findWithBeforeFinder(String mn) { |
|
725 |
try { |
|
726 |
return beforeFinder.find(mn).orElse(null); |
|
727 |
} catch (FindException e) { |
|
728 |
// unwrap |
|
729 |
throw new ResolutionException(e.getMessage(), e.getCause()); |
|
730 |
} |
|
731 |
} |
|
732 |
||
733 |
/** |
|
734 |
* Invokes the afterFinder to find method to find the given module. |
|
735 |
*/ |
|
736 |
private ModuleReference findWithAfterFinder(String mn) { |
|
737 |
try { |
|
738 |
return afterFinder.find(mn).orElse(null); |
|
739 |
} catch (FindException e) { |
|
740 |
// unwrap |
|
741 |
throw new ResolutionException(e.getMessage(), e.getCause()); |
|
742 |
} |
|
743 |
} |
|
744 |
||
745 |
/** |
|
746 |
* Returns the set of all modules that are observable with the before |
|
747 |
* and after ModuleFinders. |
|
748 |
*/ |
|
749 |
private Set<ModuleReference> findAll() { |
|
750 |
try { |
|
751 |
||
752 |
Set<ModuleReference> beforeModules = beforeFinder.findAll(); |
|
753 |
Set<ModuleReference> afterModules = afterFinder.findAll(); |
|
754 |
||
755 |
if (afterModules.isEmpty()) |
|
756 |
return beforeModules; |
|
757 |
||
758 |
if (beforeModules.isEmpty() && parent == Configuration.empty()) |
|
759 |
return afterModules; |
|
760 |
||
761 |
Set<ModuleReference> result = new HashSet<>(beforeModules); |
|
762 |
for (ModuleReference mref : afterModules) { |
|
763 |
String name = mref.descriptor().name(); |
|
764 |
if (!beforeFinder.find(name).isPresent() |
|
765 |
&& !parent.findModule(name).isPresent()) |
|
766 |
result.add(mref); |
|
767 |
} |
|
768 |
||
769 |
return result; |
|
770 |
||
771 |
} catch (FindException e) { |
|
772 |
// unwrap |
|
773 |
throw new ResolutionException(e.getMessage(), e.getCause()); |
|
774 |
} |
|
775 |
} |
|
776 |
||
777 |
/** |
|
778 |
* Returns the package name |
|
779 |
*/ |
|
780 |
private static String packageName(String cn) { |
|
781 |
int index = cn.lastIndexOf("."); |
|
782 |
return (index == -1) ? "" : cn.substring(0, index); |
|
783 |
} |
|
784 |
||
785 |
/** |
|
786 |
* Throw ResolutionException with the given format string and arguments |
|
787 |
*/ |
|
788 |
private static void fail(String fmt, Object ... args) { |
|
789 |
String msg = String.format(fmt, args); |
|
790 |
throw new ResolutionException(msg); |
|
791 |
} |
|
792 |
||
793 |
/** |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
794 |
* Tracing support |
36511 | 795 |
*/ |
796 |
||
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
797 |
private boolean isTracing() { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
798 |
return traceOutput != null; |
36511 | 799 |
} |
800 |
||
801 |
private void trace(String fmt, Object ... args) { |
|
37779
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
802 |
if (traceOutput != null) { |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
803 |
traceOutput.format("[Resolver] " + fmt, args); |
7c84df693837
8154956: Module system implementation refresh (4/2016)
alanb
parents:
36511
diff
changeset
|
804 |
traceOutput.println(); |
36511 | 805 |
} |
806 |
} |
|
807 |
||
808 |
} |