veyron/profiles: Create profile init functions.

Change-Id: I06e5308de6edca7e11bb752fefeb4bb9d670c541
diff --git a/profiles/roaming/roaminginit.go b/profiles/roaming/roaminginit.go
new file mode 100644
index 0000000..98e74ee
--- /dev/null
+++ b/profiles/roaming/roaminginit.go
@@ -0,0 +1,161 @@
+package roaming
+
+import (
+	"flag"
+
+	"v.io/core/veyron2"
+	"v.io/core/veyron2/config"
+	"v.io/core/veyron2/context"
+	"v.io/core/veyron2/ipc"
+
+	"v.io/core/veyron/lib/appcycle"
+	"v.io/core/veyron/lib/flags"
+	"v.io/core/veyron/lib/netconfig"
+	"v.io/core/veyron/lib/netstate"
+	"v.io/core/veyron/profiles/internal"
+	_ "v.io/core/veyron/runtimes/google/ipc/protocols/tcp"
+	_ "v.io/core/veyron/runtimes/google/ipc/protocols/ws"
+	_ "v.io/core/veyron/runtimes/google/ipc/protocols/wsh"
+	grt "v.io/core/veyron/runtimes/google/rt"
+	"v.io/core/veyron/services/mgmt/debug"
+
+	// TODO(cnicolaou,ashankar): move this into flags.
+	sflag "v.io/core/veyron/security/flag"
+)
+
+const (
+	SettingsStreamName = "roaming"
+)
+
+var (
+	commonFlags *flags.Flags
+)
+
+func init() {
+	commonFlags = flags.CreateAndRegister(flag.CommandLine, flags.Listen)
+	veyron2.RegisterProfileInit(Init)
+}
+
+func Init(ctx *context.T) (veyron2.RuntimeX, *context.T, veyron2.Shutdown, error) {
+	runtime := &grt.RuntimeX{}
+	ctx, shutdown, err := runtime.Init(ctx, nil)
+	if err != nil {
+		return nil, nil, shutdown, err
+	}
+	log := runtime.GetLogger(ctx)
+
+	ctx = runtime.SetReservedNameDispatcher(ctx, debug.NewDispatcher(log.LogDir(), sflag.NewAuthorizerOrDie()))
+
+	lf := commonFlags.ListenFlags()
+	listenSpec := ipc.ListenSpec{
+		Addrs: ipc.ListenAddrs(lf.Addrs),
+		Proxy: lf.ListenProxy,
+	}
+
+	// Our address is private, so we test for running on GCE and for its
+	// 1:1 NAT configuration.
+	if !internal.HasPublicIP(log) {
+		if addr := internal.GCEPublicAddress(log); addr != nil {
+			listenSpec.AddressChooser = func(string, []ipc.Address) ([]ipc.Address, error) {
+				return []ipc.Address{&netstate.AddrIfc{addr, "nat", nil}}, nil
+			}
+			return runtime, ctx, shutdown, nil
+		}
+	}
+
+	ac := appcycle.New()
+	ctx = runtime.SetAppCycle(ctx, ac)
+
+	publisher := veyron2.GetPublisher(ctx)
+
+	// Create stream in Init function to avoid a race between any
+	// goroutines started here and consumers started after Init returns.
+	ch := make(chan config.Setting)
+	stop, err := publisher.CreateStream(SettingsStreamName, SettingsStreamName, ch)
+	if err != nil {
+		log.Errorf("failed to create publisher: %s", err)
+		ac.Shutdown()
+		return nil, nil, shutdown, err
+	}
+
+	prev, err := netstate.GetAccessibleIPs()
+	if err != nil {
+		log.VI(2).Infof("failed to determine network state")
+		ac.Shutdown()
+		return nil, nil, shutdown, err
+	}
+
+	// Start the dhcp watcher.
+	watcher, err := netconfig.NewNetConfigWatcher()
+	if err != nil {
+		log.VI(2).Infof("Failed to get new config watcher: %s", err)
+		ac.Shutdown()
+		return nil, nil, shutdown, err
+	}
+
+	cleanupCh := make(chan struct{})
+	watcherCh := make(chan struct{})
+
+	listenSpec.StreamPublisher = veyron2.GetPublisher(ctx)
+	listenSpec.StreamName = SettingsStreamName
+	listenSpec.AddressChooser = internal.IPAddressChooser
+
+	ctx = runtime.SetListenSpec(ctx, listenSpec)
+
+	go monitorNetworkSettingsX(ctx, watcher, prev, stop, cleanupCh, watcherCh, ch, ListenSpec)
+	profileShutdown := func() {
+		close(cleanupCh)
+		shutdown()
+		ac.Shutdown()
+		<-watcherCh
+	}
+	return runtime, ctx, profileShutdown, nil
+}
+
+// monitorNetworkSettings will monitor network configuration changes and
+// publish subsequent Settings to reflect any changes detected.
+func monitorNetworkSettingsX(ctx *context.T, watcher netconfig.NetConfigWatcher, prev netstate.AddrList, pubStop, cleanup <-chan struct{},
+	watcherLoop chan<- struct{}, ch chan<- config.Setting, listenSpec ipc.ListenSpec) {
+	defer close(ch)
+
+	log := veyron2.GetLogger(ctx)
+
+	// TODO(cnicolaou): add support for listening on multiple network addresses.
+
+done:
+	for {
+		select {
+		case <-watcher.Channel():
+			cur, err := netstate.GetAccessibleIPs()
+			if err != nil {
+				log.Errorf("failed to read network state: %s", err)
+				continue
+			}
+			removed := netstate.FindRemoved(prev, cur)
+			added := netstate.FindAdded(prev, cur)
+			log.VI(2).Infof("Previous: %d: %s", len(prev), prev)
+			log.VI(2).Infof("Current : %d: %s", len(cur), cur)
+			log.VI(2).Infof("Added   : %d: %s", len(added), added)
+			log.VI(2).Infof("Removed : %d: %s", len(removed), removed)
+			if len(removed) == 0 && len(added) == 0 {
+				log.VI(2).Infof("Network event that lead to no address changes since our last 'baseline'")
+				continue
+			}
+			if len(removed) > 0 {
+				log.VI(2).Infof("Sending removed: %s", removed)
+				ch <- ipc.NewRmAddrsSetting(removed)
+			}
+			// We will always send the best currently available address
+			if chosen, err := listenSpec.AddressChooser(listenSpec.Addrs[0].Protocol, cur); err == nil && chosen != nil {
+				ch <- ipc.NewAddAddrsSetting(chosen)
+			}
+			prev = cur
+		case <-cleanup:
+			break done
+		case <-pubStop:
+			goto done
+		}
+	}
+	watcher.Stop()
+	close(watcherLoop)
+}