author | dholmes |
Sat, 23 Jun 2018 01:32:41 -0400 | |
changeset 50735 | 2f2af62dfac7 |
parent 48477 | b7af6f568d00 |
child 51798 | f55a4bc91ef4 |
permissions | -rw-r--r-- |
2 | 1 |
/* |
50735
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
2 |
* Copyright (c) 2001, 2018, Oracle and/or its affiliates. All rights reserved. |
2 | 3 |
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
4 |
* |
|
5 |
* This code is free software; you can redistribute it and/or modify it |
|
6 |
* under the terms of the GNU General Public License version 2 only, as |
|
5506 | 7 |
* published by the Free Software Foundation. Oracle designates this |
2 | 8 |
* particular file as subject to the "Classpath" exception as provided |
5506 | 9 |
* by Oracle in the LICENSE file that accompanied this code. |
2 | 10 |
* |
11 |
* This code is distributed in the hope that it will be useful, but WITHOUT |
|
12 |
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
|
13 |
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
|
14 |
* version 2 for more details (a copy is included in the LICENSE file that |
|
15 |
* accompanied this code). |
|
16 |
* |
|
17 |
* You should have received a copy of the GNU General Public License version |
|
18 |
* 2 along with this work; if not, write to the Free Software Foundation, |
|
19 |
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
|
20 |
* |
|
5506 | 21 |
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
22 |
* or visit www.oracle.com if you need additional information or have any |
|
23 |
* questions. |
|
2 | 24 |
*/ |
25 |
||
37363
329dba26ffd2
8137058: Clear out all non-Critical APIs from sun.reflect
chegar
parents:
36511
diff
changeset
|
26 |
package jdk.internal.reflect; |
2 | 27 |
|
36511 | 28 |
|
2 | 29 |
import java.lang.reflect.*; |
30 |
import java.util.HashMap; |
|
31 |
import java.util.Map; |
|
36511 | 32 |
import java.util.Objects; |
31671
362e0c0acece
8076112: Add @HotSpotIntrinsicCandidate annotation to indicate methods for which Java Runtime has intrinsics
zmajo
parents:
31074
diff
changeset
|
33 |
import jdk.internal.HotSpotIntrinsicCandidate; |
45031
cd369ee4d4bc
8179950: Custom system class loader using Enum.valueOf in its initialization triggers java.lang.InternalError
mchung
parents:
44359
diff
changeset
|
34 |
import jdk.internal.loader.ClassLoaders; |
34882 | 35 |
import jdk.internal.misc.VM; |
2 | 36 |
|
37 |
/** Common utility routines used by both java.lang and |
|
38 |
java.lang.reflect */ |
|
39 |
||
40 |
public class Reflection { |
|
41 |
||
42 |
/** Used to filter out fields and methods from certain classes from public |
|
43 |
view, where they are sensitive or they may contain VM-internal objects. |
|
44 |
These Maps are updated very rarely. Rather than synchronize on |
|
45 |
each access, we use copy-on-write */ |
|
10342
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
46 |
private static volatile Map<Class<?>,String[]> fieldFilterMap; |
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
47 |
private static volatile Map<Class<?>,String[]> methodFilterMap; |
2 | 48 |
|
49 |
static { |
|
10342
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
50 |
Map<Class<?>,String[]> map = new HashMap<Class<?>,String[]>(); |
2 | 51 |
map.put(Reflection.class, |
52 |
new String[] {"fieldFilterMap", "methodFilterMap"}); |
|
53 |
map.put(System.class, new String[] {"security"}); |
|
31074
0a91f3afaae7
8081320: Backout JDK-8059340: ConstantPool::_resolved_references is missing in heap dump
vlivanov
parents:
31071
diff
changeset
|
54 |
map.put(Class.class, new String[] {"classLoader"}); |
2 | 55 |
fieldFilterMap = map; |
56 |
||
10342
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
57 |
methodFilterMap = new HashMap<>(); |
2 | 58 |
} |
59 |
||
16906
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
60 |
/** Returns the class of the caller of the method calling this method, |
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
61 |
ignoring frames associated with java.lang.reflect.Method.invoke() |
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
62 |
and its implementation. */ |
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
63 |
@CallerSensitive |
31671
362e0c0acece
8076112: Add @HotSpotIntrinsicCandidate annotation to indicate methods for which Java Runtime has intrinsics
zmajo
parents:
31074
diff
changeset
|
64 |
@HotSpotIntrinsicCandidate |
16906
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
65 |
public static native Class<?> getCallerClass(); |
2 | 66 |
|
67 |
/** Retrieves the access flags written to the class file. For |
|
68 |
inner classes these flags may differ from those returned by |
|
69 |
Class.getModifiers(), which searches the InnerClasses |
|
70 |
attribute to find the source-level access flags. This is used |
|
71 |
instead of Class.getModifiers() for run-time access checks due |
|
72 |
to compatibility reasons; see 4471811. Only the values of the |
|
73 |
low 13 bits (i.e., a mask of 0x1FFF) are guaranteed to be |
|
74 |
valid. */ |
|
31671
362e0c0acece
8076112: Add @HotSpotIntrinsicCandidate annotation to indicate methods for which Java Runtime has intrinsics
zmajo
parents:
31074
diff
changeset
|
75 |
@HotSpotIntrinsicCandidate |
20872
8e486b70dff8
8022718: Runtime accessibility checking: protected class, if extended, should be accessible from another package
drchase
parents:
16906
diff
changeset
|
76 |
public static native int getClassAccessFlags(Class<?> c); |
2 | 77 |
|
78 |
||
41560
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
79 |
/** |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
80 |
* Ensures that access to a member is granted and throws |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
81 |
* IllegalAccessException if not. |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
82 |
* |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
83 |
* @param currentClass the class performing the access |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
84 |
* @param memberClass the declaring class of the member being accessed |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
85 |
* @param targetClass the class of target object if accessing instance |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
86 |
* field or method; |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
87 |
* or the declaring class if accessing constructor; |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
88 |
* or null if accessing static field or method |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
89 |
* @param modifiers the member's access modifiers |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
90 |
* @throws IllegalAccessException if access to member is denied |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
91 |
*/ |
10342
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
92 |
public static void ensureMemberAccess(Class<?> currentClass, |
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
93 |
Class<?> memberClass, |
41560
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
94 |
Class<?> targetClass, |
2 | 95 |
int modifiers) |
96 |
throws IllegalAccessException |
|
97 |
{ |
|
41560
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
98 |
if (!verifyMemberAccess(currentClass, memberClass, targetClass, modifiers)) { |
44359
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
99 |
throw newIllegalAccessException(currentClass, memberClass, targetClass, modifiers); |
2 | 100 |
} |
101 |
} |
|
102 |
||
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41560
diff
changeset
|
103 |
/** |
44359
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
104 |
* Verify access to a member and return {@code true} if it is granted. |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
105 |
* |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
106 |
* @param currentClass the class performing the access |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
107 |
* @param memberClass the declaring class of the member being accessed |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
108 |
* @param targetClass the class of target object if accessing instance |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
109 |
* field or method; |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
110 |
* or the declaring class if accessing constructor; |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
111 |
* or null if accessing static field or method |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
112 |
* @param modifiers the member's access modifiers |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
113 |
* @return {@code true} if access to member is granted |
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41560
diff
changeset
|
114 |
*/ |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41560
diff
changeset
|
115 |
public static boolean verifyMemberAccess(Class<?> currentClass, |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41560
diff
changeset
|
116 |
Class<?> memberClass, |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41560
diff
changeset
|
117 |
Class<?> targetClass, |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41560
diff
changeset
|
118 |
int modifiers) |
2 | 119 |
{ |
120 |
if (currentClass == memberClass) { |
|
121 |
// Always succeeds |
|
122 |
return true; |
|
123 |
} |
|
124 |
||
44359
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
125 |
if (!verifyModuleAccess(currentClass.getModule(), memberClass)) { |
36511 | 126 |
return false; |
127 |
} |
|
128 |
||
44359
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
129 |
boolean gotIsSameClassPackage = false; |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
130 |
boolean isSameClassPackage = false; |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
131 |
|
2 | 132 |
if (!Modifier.isPublic(getClassAccessFlags(memberClass))) { |
133 |
isSameClassPackage = isSameClassPackage(currentClass, memberClass); |
|
134 |
gotIsSameClassPackage = true; |
|
135 |
if (!isSameClassPackage) { |
|
136 |
return false; |
|
137 |
} |
|
138 |
} |
|
139 |
||
140 |
// At this point we know that currentClass can access memberClass. |
|
141 |
||
142 |
if (Modifier.isPublic(modifiers)) { |
|
143 |
return true; |
|
144 |
} |
|
145 |
||
50735
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
146 |
// Check for nestmate access if member is private |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
147 |
if (Modifier.isPrivate(modifiers)) { |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
148 |
// Note: targetClass may be outside the nest, but that is okay |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
149 |
// as long as memberClass is in the nest. |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
150 |
if (areNestMates(currentClass, memberClass)) { |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
151 |
return true; |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
152 |
} |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
153 |
} |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
154 |
|
2 | 155 |
boolean successSoFar = false; |
156 |
||
157 |
if (Modifier.isProtected(modifiers)) { |
|
158 |
// See if currentClass is a subclass of memberClass |
|
159 |
if (isSubclassOf(currentClass, memberClass)) { |
|
160 |
successSoFar = true; |
|
161 |
} |
|
162 |
} |
|
163 |
||
164 |
if (!successSoFar && !Modifier.isPrivate(modifiers)) { |
|
165 |
if (!gotIsSameClassPackage) { |
|
166 |
isSameClassPackage = isSameClassPackage(currentClass, |
|
167 |
memberClass); |
|
168 |
gotIsSameClassPackage = true; |
|
169 |
} |
|
170 |
||
171 |
if (isSameClassPackage) { |
|
172 |
successSoFar = true; |
|
173 |
} |
|
174 |
} |
|
175 |
||
176 |
if (!successSoFar) { |
|
177 |
return false; |
|
178 |
} |
|
179 |
||
41560
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
180 |
// Additional test for protected instance members |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
181 |
// and protected constructors: JLS 6.6.2 |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
182 |
if (targetClass != null && Modifier.isProtected(modifiers) && |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
183 |
targetClass != currentClass) |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
184 |
{ |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
185 |
if (!gotIsSameClassPackage) { |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
186 |
isSameClassPackage = isSameClassPackage(currentClass, memberClass); |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
187 |
gotIsSameClassPackage = true; |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
188 |
} |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
189 |
if (!isSameClassPackage) { |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
190 |
if (!isSubclassOf(targetClass, currentClass)) { |
a66e7ee16cf9
6378384: (reflect) subclass can’t access superclass’s protected fields and methods by reflection
plevart
parents:
37781
diff
changeset
|
191 |
return false; |
2 | 192 |
} |
193 |
} |
|
194 |
} |
|
195 |
||
196 |
return true; |
|
197 |
} |
|
198 |
||
36511 | 199 |
/** |
44359
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
200 |
* Returns {@code true} if memberClass's module exports memberClass's |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
201 |
* package to currentModule. |
36511 | 202 |
*/ |
203 |
public static boolean verifyModuleAccess(Module currentModule, Class<?> memberClass) { |
|
204 |
Module memberModule = memberClass.getModule(); |
|
44359
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
205 |
if (currentModule == memberModule) { |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
206 |
// same module (named or unnamed) or both null if called |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
207 |
// before module system is initialized, which means we are |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
208 |
// dealing with java.base only. |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
209 |
return true; |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
210 |
} else { |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
211 |
String pkg = memberClass.getPackageName(); |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
212 |
return memberModule.isExported(pkg, currentModule); |
42703
20c39ea4a507
8170987: Module system implementation refresh (12/2016)
alanb
parents:
42338
diff
changeset
|
213 |
} |
36511 | 214 |
} |
2 | 215 |
|
36511 | 216 |
/** |
217 |
* Returns true if two classes in the same package. |
|
218 |
*/ |
|
219 |
private static boolean isSameClassPackage(Class<?> c1, Class<?> c2) { |
|
220 |
if (c1.getClassLoader() != c2.getClassLoader()) |
|
221 |
return false; |
|
222 |
return Objects.equals(c1.getPackageName(), c2.getPackageName()); |
|
2 | 223 |
} |
224 |
||
10342
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
225 |
static boolean isSubclassOf(Class<?> queryClass, |
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
226 |
Class<?> ofClass) |
2 | 227 |
{ |
228 |
while (queryClass != null) { |
|
229 |
if (queryClass == ofClass) { |
|
230 |
return true; |
|
231 |
} |
|
232 |
queryClass = queryClass.getSuperclass(); |
|
233 |
} |
|
234 |
return false; |
|
235 |
} |
|
236 |
||
237 |
// fieldNames must contain only interned Strings |
|
10342
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
238 |
public static synchronized void registerFieldsToFilter(Class<?> containingClass, |
2 | 239 |
String ... fieldNames) { |
240 |
fieldFilterMap = |
|
241 |
registerFilter(fieldFilterMap, containingClass, fieldNames); |
|
242 |
} |
|
243 |
||
244 |
// methodNames must contain only interned Strings |
|
10342
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
245 |
public static synchronized void registerMethodsToFilter(Class<?> containingClass, |
2 | 246 |
String ... methodNames) { |
247 |
methodFilterMap = |
|
248 |
registerFilter(methodFilterMap, containingClass, methodNames); |
|
249 |
} |
|
250 |
||
10342
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
251 |
private static Map<Class<?>,String[]> registerFilter(Map<Class<?>,String[]> map, |
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
252 |
Class<?> containingClass, String ... names) { |
2 | 253 |
if (map.get(containingClass) != null) { |
254 |
throw new IllegalArgumentException |
|
255 |
("Filter already registered: " + containingClass); |
|
256 |
} |
|
10342
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
257 |
map = new HashMap<Class<?>,String[]>(map); |
2 | 258 |
map.put(containingClass, names); |
259 |
return map; |
|
260 |
} |
|
261 |
||
10342
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
262 |
public static Field[] filterFields(Class<?> containingClass, |
2 | 263 |
Field[] fields) { |
264 |
if (fieldFilterMap == null) { |
|
265 |
// Bootstrapping |
|
266 |
return fields; |
|
267 |
} |
|
268 |
return (Field[])filter(fields, fieldFilterMap.get(containingClass)); |
|
269 |
} |
|
270 |
||
10342
ca0984bc9d32
7077389: Reflection classes do not build with javac -Xlint:all -Werror
jjg
parents:
5506
diff
changeset
|
271 |
public static Method[] filterMethods(Class<?> containingClass, Method[] methods) { |
2 | 272 |
if (methodFilterMap == null) { |
273 |
// Bootstrapping |
|
274 |
return methods; |
|
275 |
} |
|
276 |
return (Method[])filter(methods, methodFilterMap.get(containingClass)); |
|
277 |
} |
|
278 |
||
279 |
private static Member[] filter(Member[] members, String[] filteredNames) { |
|
280 |
if ((filteredNames == null) || (members.length == 0)) { |
|
281 |
return members; |
|
282 |
} |
|
283 |
int numNewMembers = 0; |
|
284 |
for (Member member : members) { |
|
285 |
boolean shouldSkip = false; |
|
286 |
for (String filteredName : filteredNames) { |
|
287 |
if (member.getName() == filteredName) { |
|
288 |
shouldSkip = true; |
|
289 |
break; |
|
290 |
} |
|
291 |
} |
|
292 |
if (!shouldSkip) { |
|
293 |
++numNewMembers; |
|
294 |
} |
|
295 |
} |
|
296 |
Member[] newMembers = |
|
297 |
(Member[])Array.newInstance(members[0].getClass(), numNewMembers); |
|
298 |
int destIdx = 0; |
|
299 |
for (Member member : members) { |
|
300 |
boolean shouldSkip = false; |
|
301 |
for (String filteredName : filteredNames) { |
|
302 |
if (member.getName() == filteredName) { |
|
303 |
shouldSkip = true; |
|
304 |
break; |
|
305 |
} |
|
306 |
} |
|
307 |
if (!shouldSkip) { |
|
308 |
newMembers[destIdx++] = member; |
|
309 |
} |
|
310 |
} |
|
311 |
return newMembers; |
|
312 |
} |
|
16906
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
313 |
|
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
314 |
/** |
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
315 |
* Tests if the given method is caller-sensitive and the declaring class |
36511 | 316 |
* is defined by either the bootstrap class loader or platform class loader. |
16906
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
317 |
*/ |
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
318 |
public static boolean isCallerSensitive(Method m) { |
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
319 |
final ClassLoader loader = m.getDeclaringClass().getClassLoader(); |
46047
97d615d81827
8161121: VM::isSystemDomainLoader should consider platform class loader
mchung
parents:
45031
diff
changeset
|
320 |
if (VM.isSystemDomainLoader(loader)) { |
16906
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
321 |
return m.isAnnotationPresent(CallerSensitive.class); |
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
322 |
} |
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
323 |
return false; |
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
324 |
} |
44dfee24cb71
8010117: Annotate jdk caller sensitive methods with @sun.reflect.CallerSensitive
mchung
parents:
14342
diff
changeset
|
325 |
|
36511 | 326 |
/** |
44359
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
327 |
* Returns an IllegalAccessException with an exception message based on |
36511 | 328 |
* the access that is denied. |
329 |
*/ |
|
44359
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
330 |
public static IllegalAccessException newIllegalAccessException(Class<?> currentClass, |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
331 |
Class<?> memberClass, |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
332 |
Class<?> targetClass, |
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
333 |
int modifiers) |
36511 | 334 |
throws IllegalAccessException |
335 |
{ |
|
336 |
String currentSuffix = ""; |
|
337 |
String memberSuffix = ""; |
|
338 |
Module m1 = currentClass.getModule(); |
|
339 |
if (m1.isNamed()) |
|
340 |
currentSuffix = " (in " + m1 + ")"; |
|
341 |
Module m2 = memberClass.getModule(); |
|
342 |
if (m2.isNamed()) |
|
343 |
memberSuffix = " (in " + m2 + ")"; |
|
344 |
||
43712
5dfd0950317c
8173393: Module system implementation refresh (2/2017)
alanb
parents:
42703
diff
changeset
|
345 |
String memberPackageName = memberClass.getPackageName(); |
36511 | 346 |
|
347 |
String msg = currentClass + currentSuffix + " cannot access "; |
|
348 |
if (m2.isExported(memberPackageName, m1)) { |
|
349 |
||
350 |
// module access okay so include the modifiers in the message |
|
351 |
msg += "a member of " + memberClass + memberSuffix + |
|
352 |
" with modifiers \"" + Modifier.toString(modifiers) + "\""; |
|
353 |
||
354 |
} else { |
|
355 |
// module access failed |
|
356 |
msg += memberClass + memberSuffix+ " because " |
|
357 |
+ m2 + " does not export " + memberPackageName; |
|
358 |
if (m2.isNamed()) msg += " to " + m1; |
|
359 |
} |
|
360 |
||
44359
c6761862ca0b
8174823: Module system implementation refresh (3/2017)
alanb
parents:
43712
diff
changeset
|
361 |
return new IllegalAccessException(msg); |
36511 | 362 |
} |
50735
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
363 |
|
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
364 |
/** |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
365 |
* Returns true if {@code currentClass} and {@code memberClass} |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
366 |
* are nestmates - that is, if they have the same nesthost as |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
367 |
* determined by the VM. |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
368 |
*/ |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
369 |
public static native boolean areNestMates(Class<?> currentClass, |
2f2af62dfac7
8010319: Implementation of JEP 181: Nest-Based Access Control
dholmes
parents:
48477
diff
changeset
|
370 |
Class<?> memberClass); |
2 | 371 |
} |