veyron2/ipc: 2 of n. 'Invoker and Signature' rationalisation.
See https://veyron-review.googlesource.com/#/c/6254.
This adds Serve and ServeDispatcher, the only application
affected by this is wsprd.
Change-Id: Ic5dbcea9a0da5f840d61746955f3c553566e26f6
diff --git a/runtimes/google/ipc/server.go b/runtimes/google/ipc/server.go
index 8cfa9e9..115615f 100644
--- a/runtimes/google/ipc/server.go
+++ b/runtimes/google/ipc/server.go
@@ -533,7 +533,33 @@
}
}
-func (s *server) Serve(name string, disp ipc.Dispatcher) error {
+func (s *server) Serve(name string, obj interface{}) error {
+ if obj == nil {
+ // nil is an allowed value for obj.
+ return s.ServeDispatcher(name, ipc.Dispatcher(nil))
+ }
+ // TRANSITION: this will be disallowed when the transition is complete.
+ if disp, ok := obj.(ipc.Dispatcher); ok {
+ return s.ServeDispatcher(name, disp)
+ }
+ // TRANSITION: We may fail the dispatcher type test, but still be a
+ // dispatcher becase our Lookup method returns ipc.Invoker and not a
+ // raw object. This code here will detect that case and panic as an aid
+ // to catching these cases early.
+ typ := reflect.TypeOf(obj)
+ if lookup, found := typ.MethodByName("Lookup"); found {
+ if lookup.Type.NumIn() == 3 && lookup.Type.NumOut() == 3 {
+ inv := lookup.Type.Out(0)
+ if inv.Name() == "Invoker" {
+ panic(fmt.Sprintf("%q has a Lookup that returns an Invoker", lookup.Name))
+ }
+ }
+ }
+ // TRANSITION: this will go away in the transition.
+ panic("should never get here")
+}
+
+func (s *server) ServeDispatcher(name string, disp ipc.Dispatcher) error {
defer vlog.LogCall()()
s.Lock()
defer s.Unlock()
@@ -746,6 +772,20 @@
return &req, nil
}
+func lookupInvoker(d ipc.Dispatcher, name, method string) (ipc.Invoker, security.Authorizer, error) {
+ obj, auth, err := d.Lookup(name, method)
+ switch {
+ case err != nil:
+ return nil, nil, err
+ case obj == nil:
+ return nil, auth, nil
+ }
+ if invoker, ok := obj.(ipc.Invoker); ok {
+ return invoker, auth, nil
+ }
+ return ipc.ReflectInvoker(obj), auth, nil
+}
+
func (fs *flowServer) processRequest() ([]interface{}, verror.E) {
start := time.Now()
@@ -809,17 +849,11 @@
fs.discharges[d.ID()] = d
}
// Lookup the invoker.
- obj, auth, suffix, verr := fs.lookup(req.Suffix, req.Method)
+ invoker, auth, suffix, verr := fs.lookup(req.Suffix, req.Method)
fs.suffix = suffix // with leading /'s stripped
if verr != nil {
return nil, verr
}
- // TODO(cnicolaou): ipc.Serve TRANSITION
- invoker, ok := obj.(ipc.Invoker)
- if !ok {
- panic("Lookup should have returned an ipc.Invoker")
- }
-
// Prepare invoker and decode args.
numArgs := int(req.NumPosArgs)
argptrs, label, err := invoker.Prepare(req.Method, numArgs)
@@ -858,7 +892,7 @@
// invoker. Otherwise, and we use the server's dispatcher. The (stripped) name
// and dispatch suffix are also returned.
// TODO(cnicolaou): change this back returning in ipc.Invoker in the pt2 CL.
-func (fs *flowServer) lookup(name, method string) (interface{}, security.Authorizer, string, verror.E) {
+func (fs *flowServer) lookup(name, method string) (ipc.Invoker, security.Authorizer, string, verror.E) {
name = strings.TrimLeft(name, "/")
if method == "Glob" && len(name) == 0 {
return ipc.ReflectInvoker(&globInvoker{fs.reservedOpt.Prefix, fs}), &acceptAllAuthorizer{}, name, nil
@@ -872,7 +906,7 @@
}
if disp != nil {
- invoker, auth, err := disp.Lookup(name, method)
+ invoker, auth, err := lookupInvoker(disp, name, method)
switch {
case err != nil:
return nil, nil, "", verror.Convert(err)