/* * Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package jdk.incubator.jpackage.internal; import java.io.IOException; import java.nio.file.Files; import java.nio.file.Path; import java.util.*; import java.util.function.Predicate; import java.util.regex.Matcher; import java.util.regex.Pattern; import java.util.stream.Collectors; import java.util.stream.Stream; /** * Builds list of packages providing dynamic libraries for the given set of files. */ final public class LibProvidersLookup { static boolean supported() { return (new ToolValidator(TOOL_LDD).validate() == null); } public LibProvidersLookup() { } LibProvidersLookup setPackageLookup(PackageLookup v) { packageLookup = v; return this; } List execute(Path root) throws IOException { // Get the list of files in the root for which to look up for needed shared libraries List allPackageFiles; try (Stream stream = Files.walk(root)) { allPackageFiles = stream.filter(Files::isRegularFile).filter( LibProvidersLookup::canDependOnLibs).collect( Collectors.toList()); } Collection neededLibs = getNeededLibsForFiles(allPackageFiles); // Get the list of unique package names. List neededPackages = neededLibs.stream().map(libPath -> { try { List packageNames = packageLookup.apply(libPath).filter( Objects::nonNull).filter(Predicate.not(String::isBlank)).distinct().collect( Collectors.toList()); Log.verbose(String.format("%s is provided by %s", libPath, packageNames)); return packageNames; } catch (IOException ex) { // Ignore and keep going Log.verbose(ex); List packageNames = Collections.emptyList(); return packageNames; } }).flatMap(List::stream).sorted().distinct().collect(Collectors.toList()); return neededPackages; } private static List getNeededLibsForFile(Path path) throws IOException { List result = new ArrayList<>(); int ret = Executor.of(TOOL_LDD, path.toString()).setOutputConsumer(lines -> { lines.map(line -> { Matcher matcher = LIB_IN_LDD_OUTPUT_REGEX.matcher(line); if (matcher.find()) { return matcher.group(1); } return null; }).filter(Objects::nonNull).map(Path::of).forEach(result::add); }).execute(); if (ret != 0) { // objdump failed. This is OK if the tool was applied to not a binary file return Collections.emptyList(); } return result; } private static Collection getNeededLibsForFiles(List paths) { // Depending on tool used, the set can contain full paths (ldd) or // only file names (objdump). Set allLibs = paths.stream().map(path -> { List libs; try { libs = getNeededLibsForFile(path); } catch (IOException ex) { Log.verbose(ex); libs = Collections.emptyList(); } return libs; }).flatMap(List::stream).collect(Collectors.toSet()); // `allLibs` contains names of all .so needed by files from `paths` list. // If there are mutual dependencies between binaries from `paths` list, // then names or full paths to these binaries are in `allLibs` set. // Remove these items from `allLibs`. Set excludedNames = paths.stream().map(Path::getFileName).collect( Collectors.toSet()); Iterator it = allLibs.iterator(); while (it.hasNext()) { Path libName = it.next().getFileName(); if (excludedNames.contains(libName)) { it.remove(); } } return allLibs; } private static boolean canDependOnLibs(Path path) { return path.toFile().canExecute() || path.toString().endsWith(".so"); } @FunctionalInterface public interface PackageLookup { Stream apply(Path path) throws IOException; } private PackageLookup packageLookup; private static final String TOOL_LDD = "ldd"; // // Typical ldd output: // // ldd: warning: you do not have execution permission for `/tmp/jdk.incubator.jpackage17911687595930080396/images/opt/simplepackagetest/lib/runtime/lib/libawt_headless.so' // linux-vdso.so.1 => (0x00007ffce6bfd000) // libawt.so => /tmp/jdk.incubator.jpackage17911687595930080396/images/opt/simplepackagetest/lib/runtime/lib/libawt.so (0x00007f4e00c75000) // libjvm.so => not found // libjava.so => /tmp/jdk.incubator.jpackage17911687595930080396/images/opt/simplepackagetest/lib/runtime/lib/libjava.so (0x00007f4e00c41000) // libm.so.6 => /lib64/libm.so.6 (0x00007f4e00834000) // libdl.so.2 => /lib64/libdl.so.2 (0x00007f4e00630000) // libc.so.6 => /lib64/libc.so.6 (0x00007f4e00262000) // libjvm.so => not found // libjvm.so => not found // libverify.so => /tmp/jdk.incubator.jpackage17911687595930080396/images/opt/simplepackagetest/lib/runtime/lib/libverify.so (0x00007f4e00c2e000) // /lib64/ld-linux-x86-64.so.2 (0x00007f4e00b36000) // libjvm.so => not found // private static final Pattern LIB_IN_LDD_OUTPUT_REGEX = Pattern.compile( "^\\s*\\S+\\s*=>\\s*(\\S+)\\s+\\(0[xX]\\p{XDigit}+\\)"); }