Commit Graph

231 Commits

Author SHA1 Message Date
Juan Silveira
79f19eb9f1 Keep pointers to extension values.
The current implementation of getExtension deserialises the field from bytes
and returns a new object every time. This means that changes to those objects
are reflected when the messages is serialised unless setExtension is called. It
also means that every call to getExtension and setExtension is expensive.

This change introduces a FieldData class that contains everything that's known
about the field at the time. This can be all the tag/byte[] pairs associated
with a given field or an Extension and a value object. This is so that two
messages with a repeated extension can be compared even if the extension
has been deserialised in one of them but not the other.

This change also adds FieldArray class based on SparseArray from the Android
compatibility library. This is used in ExtendableMessageNano to make lookup
of FieldDatas by their field number faster.

Implications:
* calling getExtension multiple times deserialises the field only once and
  returns the same object.
* calling setExtension doesn't cause the object to be serialised immediately,
  that only happens when the container message is serialised.
* getExtension is no longer a read-only thread-safe operation. README.txt has
  been updated to relfect that.
* comparison using equals and hashCode continues to work.

Bug: 10863158

Change-Id: I81c7cb0c73cc0611a1f7c1eabf5eed259738e8bc
2014-07-14 16:54:28 +01:00
Ying Wang
70ef74aaa6 am 49512cb0: Merge "You CANNOT change the global WITH_DEXPREOPT"
* commit '49512cb01065b41c0113248c2c02800de1156d50':
  You CANNOT change the global WITH_DEXPREOPT
2014-05-02 04:00:31 +00:00
Ying Wang
b54018a23c Merge "You CANNOT change the global WITH_DEXPREOPT" 2014-05-02 03:57:04 +00:00
Ying Wang
d75027090c You CANNOT change the global WITH_DEXPREOPT
Bug: 14380196
Change-Id: I2b9e6db081558687afd5c20c7084824dfe1bb26e
2014-05-01 20:45:22 -07:00
Jan-Willem Maarse
3e46c9b5da am d20f0a42: Merge "Fix NPE when clearing an extension in nano protos"
* commit 'd20f0a4260763531acf5de677e4830afe0bfc53e':
  Fix NPE when clearing an extension in nano protos
2014-05-01 18:36:30 +00:00
Jan-Willem Maarse
4aecb2b6d5 Merge "Fix NPE when clearing an extension in nano protos" 2014-05-01 18:33:28 +00:00
Jan-Willem Maarse
b24fdd476f Fix NPE when clearing an extension in nano protos
If ExtendableMessageNano doesn't have any unknown fields, trying to
clear an extension by setting it to null would throw an NPE.

Change-Id: I6abcdfcc0193de44f97b21dd6cc2f40604938a1a
2014-05-01 11:08:38 -07:00
Bill Yi
af802cd274 Merge commit 'ba89934bdae7f4256c94a0a24992903a114e764f' into HEAD 2014-04-29 11:34:12 -07:00
Jeff Davidson
a2724e7cf3 Merge "Support generation of Parcelable nano messages." 2014-04-25 22:11:04 +00:00
Jeff Davidson
ec4b1ce0b6 Support generation of Parcelable nano messages.
This CL adds the "parcelable_messages" option. When enabled, all
generated message classes will conform to the Android Parcelable
contract. This is achieved by introducing a new parent class for
generated classes which implements the required functionality.

Since the store_unknown_fields option also makes use of a superclass,
ExtendableMessageNano, we have two versions of the new Parcelable
superclass: one extending MessageNano, and one extending
ExtendableMessageNano. These classes are otherwise identical.

As these classes depend on Android framework jars, they are not
included in the host .jar build of the nanoproto library.

Finally, add a test suite for running tests of Android-specific
functionality, as this cannot be done on a desktop JVM.

Change-Id: Icc2a257f03317e947f7078dbb9857c3286857497
2014-04-25 14:34:55 -07:00
Max Cai
f1019531a6 Merge "Adds --ignore_service nano proto compiler flag" 2014-04-24 18:51:56 +00:00
Jie Dai
d9425a6218 Adds --ignore_service nano proto compiler flag
Nano proto compiler normally throws an error if any service is
defined. If --ignore-services=true is set, no error is thrown and the
service is simply skipped.

Change-Id: Id82583555085cc55550d03a485d3f0189885240b
2014-04-23 09:27:07 -07:00
Max Cai
56cba8eeae Merge "Don't reset cachedSize to 0 in getSerializedSize" 2014-04-14 14:57:54 +00:00
Dave Hawkey
598087ef53 Don't reset cachedSize to 0 in getSerializedSize
This avoids a race-condition when cachedSize is momentarily set to 0
for non-empty messages if multiple threads call getSerializedSize
(e.g. during serialization).

This is a retry of https://android-review.googlesource.com/#/c/88570/.
getSerializedSize() has been kept non-final so that messages generated
with a previous version of the compiler will not break.

Change-Id: I8d8154a10938cde579ae19c55eae55b1e70e0bda
2014-04-10 08:21:44 -06:00
Wink Saville
6ba01e2439 am ce2f5991: Merge "Revert "Don\'t reset cachedSize to 0 in getSerializedSize""
* commit 'ce2f59915e0b41c935e3f72a2b7b71b6c19b6860':
  Revert "Don't reset cachedSize to 0 in getSerializedSize"
2014-03-22 01:20:45 +00:00
Wink Saville
dc2ab87569 Merge "Revert "Don't reset cachedSize to 0 in getSerializedSize"" 2014-03-22 01:09:34 +00:00
Wink Saville
b7dd7d9294 Revert "Don't reset cachedSize to 0 in getSerializedSize"
This reverts commit c6e12c6702ca764486f952654ba1568f00efe813.
2014-03-21 18:05:10 -07:00
Wink Saville
9d89464330 am ec0b12c3: Merge "Don\'t reset cachedSize to 0 in getSerializedSize"
* commit 'ec0b12c34a6329d2f98003e9102fe2d75726c797':
  Don't reset cachedSize to 0 in getSerializedSize
2014-03-21 17:17:27 +00:00
Wink Saville
ddc98d6dd0 Merge "Don't reset cachedSize to 0 in getSerializedSize" 2014-03-21 17:08:31 +00:00
Dave Hawkey
5090f19ea7 Don't reset cachedSize to 0 in getSerializedSize
This avoids a race-condition when cachedSize is momentarily set to 0
for non-empty messages if multiple threads call getSerializedSize
(e.g. during serialization).

Change-Id: I15a8ded92edbf41bf1c8d787960c5bbbc8a323c5
2014-03-21 09:27:23 -06:00
Wink Saville
66ec7d4151 am 51ef8f39: Merge "Fix compile error on mac 10.9"
* commit '51ef8f39de376fe71ce5d2c682abe4f974cf8074':
  Fix compile error on mac 10.9
2014-03-08 01:52:05 +00:00
Max Cai
e73c4a02a9 am afc1553a: Merge "Extension overhaul."
* commit 'afc1553a9eb56eff742828c9c819eafa363cdcc9':
  Extension overhaul.
2014-03-07 19:39:30 +00:00
Max Cai
b97d258c9f am 447f664a: Merge changes I9fecff3c,I2c1eb07f
* commit '447f664aef6694bb9fb3db85d6166d908cde8a8d':
  Fix repeated packed field merging code for non-packed data.
  Add validation when parsing enum fields.
2014-03-07 02:25:57 +00:00
Max Cai
3a2109246f Merge "Extension overhaul." 2014-02-17 15:28:08 +00:00
Max Cai
a2d72a5853 Merge changes I9fecff3c,I2c1eb07f
* changes:
  Fix repeated packed field merging code for non-packed data.
  Add validation when parsing enum fields.
2014-02-10 14:04:23 +00:00
Max Cai
74959d4796 Fix repeated packed field merging code for non-packed data.
Enum fix is already included in the previous commit.

Bug: https://code.google.com/p/android/issues/detail?id=64893
Change-Id: I9fecff3c8822918a019028eb57fa39b361a2c960
2014-01-16 12:41:26 +00:00
Max Cai
e005be6554 Add validation when parsing enum fields.
Invalid values from the wire are silently ignored.
Unlike full/lite, the invalid values are not stored into the
unknown fields, because there's no way to get them out from
Nano's unknown fields without a matching Extension.

Edited README and slightly moved it towards a standalone
section for Nano, independent of the Micro section.

Change-Id: I2c1eb07f4d6d8f3aea242b8ddd95b9c966f3f177
2014-01-16 12:41:15 +00:00
Max Cai
14ae5639b3 am a8af729b: Merge "Allow whitespace in nano codegen options."
* commit 'a8af729b5ef822971f025a7e8ff197545986910d':
  Allow whitespace in nano codegen options.
2014-01-14 10:14:47 -08:00
Max Cai
a793c09b6f Merge "Allow whitespace in nano codegen options." 2014-01-14 18:08:45 +00:00
Max Cai
bc8eec3d2b Allow whitespace in nano codegen options.
So we don't need to keep all option in a single line in the .mk files.

Change-Id: I786b879b334cac4cd13b32fabcb76efe53b4ac80
2014-01-14 15:03:05 +00:00
Max Cai
d44a519d8f am 4b5874fa: Merge "Correctness: floating point equality using bits instead of ==."
* commit '4b5874fad099faefb469c632e4c7b854cea733ae':
  Correctness: floating point equality using bits instead of ==.
2014-01-13 05:25:49 -08:00
Max Cai
eeda36e47c am d6aeae14: Merge "Don\'t serialize required fields whose \'has\' flags are unset."
* commit 'd6aeae143cde31b79a2d57a3ee0e41d9083d232d':
  Don't serialize required fields whose 'has' flags are unset.
2014-01-13 05:25:49 -08:00
Max Cai
0eecf0b83f Merge "Correctness: floating point equality using bits instead of ==." 2014-01-13 13:20:00 +00:00
Max Cai
2fb3cdf9bb Merge "Don't serialize required fields whose 'has' flags are unset." 2014-01-13 13:19:56 +00:00
Max Cai
79b311c163 Correctness: floating point equality using bits instead of ==.
Special values for float and double make it inaccurate to test the equality with ==.
The main Java library uses the standard Object.equals() implementation for all fields,
which for floating point fields means Float.equals() or Double.equals(). They define
equality as bitwise equality, with all NaN representations normalized to the same bit
sequence (and therefore equal to each other). This test checks that the nano
implementation complies with Object.equals(), so NaN == NaN and +0.0 != -0.0.

Change-Id: I97bb4a3687223d8a212c70cd736436b9dd80c1d7
2014-01-10 18:11:07 +00:00
Max Cai
1b1735ceb1 Don't serialize required fields whose 'has' flags are unset.
Change-Id: Ibbe944fff83e44a8f2206e18ee9ec6f10661297a
2014-01-10 14:43:32 +00:00
Max Cai
e3714f0001 Extension overhaul.
- Get rid of TypeLiteral<T>. It was introduced to read the component
  type of a List<T> at runtime. But we use arrays everywhere else,
  and we can always read the component type of an array type at
  runtime.
- Properly read/write "minor" types (e.g. sint32, sfixed32). The old
  implementation could only read/write data as the "typical" types
  (one per Java type), e.g. java.lang.Integer -> int32, java.lang.Long
  -> int64. So if e.g. an extension specifies sfixed32 as the type, it
  would be read/written in the totally incompatible int32 format.
- Properly serialize repeated packed fields. The old implementation
  doesn't do packed serialization. As an added bonus, and to be more
  aligned with the rest of protobuf nano / main, repeated packable
  extensions can deserialize both packed and non-packed data.
- Split Extension class into a hierarchy so under typical usage a
  large chunk of code dealing with primitive type extensions can be
  removed by ProGuard.

Bug: https://code.google.com/p/android/issues/detail?id=62586
Change-Id: I0d692f35cc2a8ad3a5a1cb3ce001282b2356b041
2014-01-10 11:50:32 +00:00
Andrew Flynn
8af6273441 am e7741c06: Merge "Fix MessageNanoPrinter for accessors"
* commit 'e7741c064ee4cdc5fa41e6444ed45131672fed97':
  Fix MessageNanoPrinter for accessors
2013-12-19 11:25:33 -08:00
Andrew Flynn
0c0f8c7ef0 Merge "Fix MessageNanoPrinter for accessors" 2013-12-19 19:19:33 +00:00
Andrew Flynn
02a9ea00d1 Fix MessageNanoPrinter for accessors
accessors mode switches proto fields away from being public fields (which is
how MessageNanoPrinter found which fields to print via reflection). Add a
pass through the methods looking for generated accessor methods to print
those as well.

Change-Id: I7c47853ecbd5534086f44b25a89dbbe56f63ed03
2013-12-12 09:43:55 -08:00
Max Cai
75c5216bb6 am 3f9bd998: Merge "Avoid class initializers to help ProGuard."
* commit '3f9bd9989c79db575b83e2f96b48c695f30ca153':
  Avoid class initializers to help ProGuard.
2013-12-10 11:03:35 -08:00
Max Cai
b3bc6095b2 Merge "Avoid class initializers to help ProGuard." 2013-12-10 18:33:40 +00:00
Max Cai
04feb76f94 Avoid class initializers to help ProGuard.
Class initializers prevent ProGuard from inlining any methods
because it thinks the class initializer may have side effects.
This is true for static methods, but instance methods can still
be inlined, because to have an instance you will have touched
the class and any class initializers would have run. But
ProGuard only starts inlining instance methods of classes with
class initializers from v4.11b6, and Android uses v4.4 now.

This change tries to avoid the class initializers as much as
possible, by delaying the initialization of the empty array and
some fields' saved defaults until when they're needed. However,
if the message hosts any extensions, they must be public static
final and therefore introducing the class initializer. In that
case we won't bother with lazy initialization.

Change-Id: I00d8296f6eb0023112b93ee135cdb28dbd52b0b8
2013-12-10 16:46:22 +00:00
Max Cai
59e39cda35 am cea499ac: Merge "Nano: don\'t generate accessor methods for nested methods"
* commit 'cea499acf68b35921b956785c26c0e6f18c241c1':
  Nano: don't generate accessor methods for nested methods
2013-12-10 05:00:24 -08:00
Max Cai
482bf5245d Merge "Nano: don't generate accessor methods for nested methods" 2013-12-10 12:56:23 +00:00
Andrew Flynn
c997c136bb Nano: don't generate accessor methods for nested methods
For nested message objects, don't generate accessor methods because they have
a default value that is not a valid value (null), so there is no reason to have
get/set/has/clear methods for them. Clients and protos (while serializing) can
check against the invalid value to see if it's been set.

Change-Id: Ic63400889581271b8cbcd9c45c84519d4921fd4b
2013-12-09 11:40:03 -08:00
The Android Open Source Project
f5b69590a4 am b6089cca: Merge commit \'0afd5a4d782037ea641d75d595cf5d38ed6978ac\' into HEAD
* commit 'b6089cca5248f19832dde54faaad62891ff8bd25':
2013-12-05 17:26:47 -08:00
The Android Open Source Project
cb64a63f0b Merge commit '0afd5a4d782037ea641d75d595cf5d38ed6978ac' into HEAD 2013-12-05 12:38:12 -08:00
The Android Open Source Project
d5d85271fe am c4c4a562: Merge commit \'7cb6b37f3799affce9e1be39977d4419283df795\' into HEAD
* commit 'c4c4a562672068fb89ea4e65408dd53de2ed8f1f':
2013-11-22 17:32:02 -08:00
The Android Open Source Project
2d2557ea70 Merge commit '7cb6b37f3799affce9e1be39977d4419283df795' into HEAD 2013-11-22 10:35:14 -08:00