author | alanb |
Thu, 01 Dec 2016 08:57:53 +0000 | |
changeset 42338 | a60f280f803c |
parent 41817 | b90ad1de93ea |
child 44359 | c6761862ca0b |
permissions | -rw-r--r-- |
36511 | 1 |
/* |
2 |
* Copyright (c) 2015, 2016, Oracle and/or its affiliates. All rights reserved. |
|
3 |
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
|
4 |
* |
|
5 |
* This code is free software; you can redistribute it and/or modify it |
|
6 |
* under the terms of the GNU General Public License version 2 only, as |
|
7 |
* published by the Free Software Foundation. Oracle designates this |
|
8 |
* particular file as subject to the "Classpath" exception as provided |
|
9 |
* by Oracle in the LICENSE file that accompanied this code. |
|
10 |
* |
|
11 |
* This code is distributed in the hope that it will be useful, but WITHOUT |
|
12 |
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
|
13 |
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
|
14 |
* version 2 for more details (a copy is included in the LICENSE file that |
|
15 |
* accompanied this code). |
|
16 |
* |
|
17 |
* You should have received a copy of the GNU General Public License version |
|
18 |
* 2 along with this work; if not, write to the Free Software Foundation, |
|
19 |
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
|
20 |
* |
|
21 |
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
|
22 |
* or visit www.oracle.com if you need additional information or have any |
|
23 |
* questions. |
|
24 |
*/ |
|
25 |
||
26 |
package jdk.internal.loader; |
|
27 |
||
28 |
import java.io.File; |
|
29 |
import java.io.FilePermission; |
|
30 |
import java.io.IOException; |
|
31 |
import java.lang.module.Configuration; |
|
32 |
import java.lang.module.ModuleDescriptor; |
|
33 |
import java.lang.module.ModuleReader; |
|
34 |
import java.lang.module.ModuleReference; |
|
35 |
import java.lang.module.ResolvedModule; |
|
36 |
import java.lang.reflect.Layer; |
|
37 |
import java.net.MalformedURLException; |
|
38 |
import java.net.URI; |
|
39 |
import java.net.URL; |
|
40 |
import java.nio.ByteBuffer; |
|
41 |
import java.security.AccessControlContext; |
|
42 |
import java.security.AccessController; |
|
43 |
import java.security.CodeSigner; |
|
44 |
import java.security.CodeSource; |
|
45 |
import java.security.Permission; |
|
46 |
import java.security.PermissionCollection; |
|
47 |
import java.security.PrivilegedAction; |
|
48 |
import java.security.PrivilegedActionException; |
|
49 |
import java.security.PrivilegedExceptionAction; |
|
50 |
import java.security.SecureClassLoader; |
|
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
51 |
import java.util.ArrayList; |
36511 | 52 |
import java.util.Collection; |
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
53 |
import java.util.Collections; |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
54 |
import java.util.Enumeration; |
36511 | 55 |
import java.util.HashMap; |
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
56 |
import java.util.List; |
36511 | 57 |
import java.util.Map; |
58 |
import java.util.Optional; |
|
59 |
import java.util.concurrent.ConcurrentHashMap; |
|
41817
b90ad1de93ea
8168789: ModuleReader.list and ModuleFinder.of update
alanb
parents:
38571
diff
changeset
|
60 |
import java.util.stream.Stream; |
36511 | 61 |
|
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
62 |
import jdk.internal.misc.SharedSecrets; |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
63 |
|
36511 | 64 |
|
65 |
/** |
|
66 |
* A class loader that loads classes and resources from a collection of |
|
67 |
* modules, or from a single module where the class loader is a member |
|
68 |
* of a pool of class loaders. |
|
69 |
* |
|
70 |
* <p> The delegation model used by this ClassLoader differs to the regular |
|
71 |
* delegation model. When requested to load a class then this ClassLoader first |
|
72 |
* maps the class name to its package name. If there a module defined to the |
|
73 |
* Loader containing the package then the class loader attempts to load from |
|
74 |
* that module. If the package is instead defined to a module in a "remote" |
|
75 |
* ClassLoader then this class loader delegates directly to that class loader. |
|
76 |
* The map of package name to remote class loader is created based on the |
|
77 |
* modules read by modules defined to this class loader. If the package is not |
|
78 |
* local or remote then this class loader will delegate to the parent class |
|
79 |
* loader. This allows automatic modules (for example) to link to types in the |
|
80 |
* unnamed module of the parent class loader. |
|
81 |
* |
|
38571
75eeea87c73d
8156143: Module.getResourceAsStream throws unspecified SecurityException with module in custom Layer
alanb
parents:
36511
diff
changeset
|
82 |
* @see Layer#defineModulesWithOneLoader |
75eeea87c73d
8156143: Module.getResourceAsStream throws unspecified SecurityException with module in custom Layer
alanb
parents:
36511
diff
changeset
|
83 |
* @see Layer#defineModulesWithManyLoaders |
36511 | 84 |
*/ |
85 |
||
86 |
public final class Loader extends SecureClassLoader { |
|
87 |
||
88 |
static { |
|
89 |
ClassLoader.registerAsParallelCapable(); |
|
90 |
} |
|
91 |
||
92 |
// the loader pool is in a pool, can be null |
|
93 |
private final LoaderPool pool; |
|
94 |
||
95 |
// parent ClassLoader, can be null |
|
96 |
private final ClassLoader parent; |
|
97 |
||
98 |
// maps a module name to a module reference |
|
99 |
private final Map<String, ModuleReference> nameToModule; |
|
100 |
||
101 |
// maps package name to a module loaded by this class loader |
|
102 |
private final Map<String, LoadedModule> localPackageToModule; |
|
103 |
||
104 |
// maps package name to a remote class loader, populated post initialization |
|
105 |
private final Map<String, ClassLoader> remotePackageToLoader |
|
106 |
= new ConcurrentHashMap<>(); |
|
107 |
||
108 |
// maps a module reference to a module reader, populated lazily |
|
109 |
private final Map<ModuleReference, ModuleReader> moduleToReader |
|
110 |
= new ConcurrentHashMap<>(); |
|
111 |
||
112 |
// ACC used when loading classes and resources */ |
|
113 |
private final AccessControlContext acc; |
|
114 |
||
115 |
/** |
|
116 |
* A module defined/loaded to a {@code Loader}. |
|
117 |
*/ |
|
118 |
private static class LoadedModule { |
|
119 |
private final ModuleReference mref; |
|
120 |
private final URL url; // may be null |
|
121 |
private final CodeSource cs; |
|
122 |
||
123 |
LoadedModule(ModuleReference mref) { |
|
124 |
URL url = null; |
|
125 |
if (mref.location().isPresent()) { |
|
126 |
try { |
|
127 |
url = mref.location().get().toURL(); |
|
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
128 |
} catch (MalformedURLException | IllegalArgumentException e) { } |
36511 | 129 |
} |
130 |
this.mref = mref; |
|
131 |
this.url = url; |
|
132 |
this.cs = new CodeSource(url, (CodeSigner[]) null); |
|
133 |
} |
|
134 |
||
135 |
ModuleReference mref() { return mref; } |
|
136 |
String name() { return mref.descriptor().name(); } |
|
137 |
URL location() { return url; } |
|
138 |
CodeSource codeSource() { return cs; } |
|
139 |
} |
|
140 |
||
141 |
||
142 |
/** |
|
143 |
* Creates a {@code Loader} in a loader pool that loads classes/resources |
|
144 |
* from one module. |
|
145 |
*/ |
|
146 |
public Loader(ResolvedModule resolvedModule, |
|
147 |
LoaderPool pool, |
|
148 |
ClassLoader parent) |
|
149 |
{ |
|
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
150 |
super("Loader-" + resolvedModule.name(), parent); |
36511 | 151 |
|
152 |
this.pool = pool; |
|
153 |
this.parent = parent; |
|
154 |
||
155 |
ModuleReference mref = resolvedModule.reference(); |
|
156 |
ModuleDescriptor descriptor = mref.descriptor(); |
|
157 |
String mn = descriptor.name(); |
|
158 |
this.nameToModule = Map.of(mn, mref); |
|
159 |
||
160 |
Map<String, LoadedModule> localPackageToModule = new HashMap<>(); |
|
161 |
LoadedModule lm = new LoadedModule(mref); |
|
162 |
descriptor.packages().forEach(pn -> localPackageToModule.put(pn, lm)); |
|
163 |
this.localPackageToModule = localPackageToModule; |
|
164 |
||
165 |
this.acc = AccessController.getContext(); |
|
166 |
} |
|
167 |
||
168 |
/** |
|
169 |
* Creates a {@code Loader} that loads classes/resources from a collection |
|
170 |
* of modules. |
|
171 |
* |
|
172 |
* @throws IllegalArgumentException |
|
173 |
* If two or more modules have the same package |
|
174 |
*/ |
|
175 |
public Loader(Collection<ResolvedModule> modules, ClassLoader parent) { |
|
176 |
super(parent); |
|
177 |
||
178 |
this.pool = null; |
|
179 |
this.parent = parent; |
|
180 |
||
181 |
Map<String, ModuleReference> nameToModule = new HashMap<>(); |
|
182 |
Map<String, LoadedModule> localPackageToModule = new HashMap<>(); |
|
183 |
for (ResolvedModule resolvedModule : modules) { |
|
184 |
ModuleReference mref = resolvedModule.reference(); |
|
185 |
ModuleDescriptor descriptor = mref.descriptor(); |
|
186 |
nameToModule.put(descriptor.name(), mref); |
|
187 |
descriptor.packages().forEach(pn -> { |
|
188 |
LoadedModule lm = new LoadedModule(mref); |
|
189 |
if (localPackageToModule.put(pn, lm) != null) |
|
190 |
throw new IllegalArgumentException("Package " |
|
191 |
+ pn + " in more than one module"); |
|
192 |
}); |
|
193 |
} |
|
194 |
this.nameToModule = nameToModule; |
|
195 |
this.localPackageToModule = localPackageToModule; |
|
196 |
||
197 |
this.acc = AccessController.getContext(); |
|
198 |
} |
|
199 |
||
200 |
||
201 |
/** |
|
202 |
* Completes initialization of this Loader. This method populates |
|
203 |
* remotePackageToLoader with the packages of the remote modules, where |
|
204 |
* "remote modules" are the modules read by modules defined to this loader. |
|
205 |
* |
|
206 |
* @param cf the Configuration containing at least modules to be defined to |
|
207 |
* this class loader |
|
208 |
* |
|
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
209 |
* @param parentLayers the parent Layers |
36511 | 210 |
*/ |
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
211 |
public Loader initRemotePackageMap(Configuration cf, |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
212 |
List<Layer> parentLayers) |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
213 |
{ |
36511 | 214 |
for (String name : nameToModule.keySet()) { |
215 |
ResolvedModule resolvedModule = cf.findModule(name).get(); |
|
216 |
assert resolvedModule.configuration() == cf; |
|
217 |
||
218 |
for (ResolvedModule other : resolvedModule.reads()) { |
|
219 |
String mn = other.name(); |
|
220 |
ClassLoader loader; |
|
221 |
||
222 |
if (other.configuration() == cf) { |
|
223 |
||
224 |
// The module reads another module in the newly created |
|
225 |
// layer. If all modules are defined to the same class |
|
226 |
// loader then the packages are local. |
|
227 |
if (pool == null) { |
|
228 |
assert nameToModule.containsKey(mn); |
|
229 |
continue; |
|
230 |
} |
|
231 |
||
232 |
loader = pool.loaderFor(mn); |
|
233 |
assert loader != null; |
|
234 |
||
235 |
} else { |
|
236 |
||
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
237 |
// find the layer for the target module |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
238 |
Layer layer = parentLayers.stream() |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
239 |
.map(parent -> findLayer(parent, other.configuration())) |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
240 |
.flatMap(Optional::stream) |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
241 |
.findAny() |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
242 |
.orElseThrow(() -> |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
243 |
new InternalError("Unable to find parent layer")); |
36511 | 244 |
|
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
245 |
// find the class loader for the module |
36511 | 246 |
// For now we use the platform loader for modules defined to the |
247 |
// boot loader |
|
248 |
assert layer.findModule(mn).isPresent(); |
|
249 |
loader = layer.findLoader(mn); |
|
250 |
if (loader == null) |
|
251 |
loader = ClassLoaders.platformClassLoader(); |
|
252 |
} |
|
253 |
||
254 |
// find the packages that are exported to the target module |
|
255 |
String target = resolvedModule.name(); |
|
256 |
ModuleDescriptor descriptor = other.reference().descriptor(); |
|
257 |
for (ModuleDescriptor.Exports e : descriptor.exports()) { |
|
258 |
boolean delegate; |
|
259 |
if (e.isQualified()) { |
|
260 |
// qualified export in same configuration |
|
261 |
delegate = (other.configuration() == cf) |
|
262 |
&& e.targets().contains(target); |
|
263 |
} else { |
|
264 |
// unqualified |
|
265 |
delegate = true; |
|
266 |
} |
|
267 |
||
268 |
if (delegate) { |
|
269 |
String pn = e.source(); |
|
270 |
ClassLoader l = remotePackageToLoader.putIfAbsent(pn, loader); |
|
271 |
if (l != null && l != loader) { |
|
272 |
throw new IllegalArgumentException("Package " |
|
273 |
+ pn + " cannot be imported from multiple loaders"); |
|
274 |
} |
|
275 |
} |
|
276 |
} |
|
277 |
} |
|
278 |
||
279 |
} |
|
280 |
||
281 |
return this; |
|
282 |
} |
|
283 |
||
284 |
/** |
|
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
285 |
* Find the layer corresponding to the given configuration in the tree |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
286 |
* of layers rooted at the given parent. |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
287 |
*/ |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
288 |
private Optional<Layer> findLayer(Layer parent, Configuration cf) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
289 |
return SharedSecrets.getJavaLangReflectModuleAccess().layers(parent) |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
290 |
.filter(l -> l.configuration() == cf) |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
291 |
.findAny(); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
292 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
293 |
|
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
294 |
|
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
295 |
/** |
36511 | 296 |
* Returns the loader pool that this loader is in or {@code null} if this |
297 |
* loader is not in a loader pool. |
|
298 |
*/ |
|
299 |
public LoaderPool pool() { |
|
300 |
return pool; |
|
301 |
} |
|
302 |
||
303 |
||
304 |
// -- resources -- |
|
305 |
||
306 |
||
307 |
/** |
|
308 |
* Returns a URL to a resource of the given name in a module defined to |
|
309 |
* this class loader. |
|
310 |
*/ |
|
311 |
@Override |
|
312 |
protected URL findResource(String mn, String name) throws IOException { |
|
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
313 |
ModuleReference mref = (mn != null) ? nameToModule.get(mn) : null; |
36511 | 314 |
if (mref == null) |
315 |
return null; // not defined to this class loader |
|
316 |
||
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
317 |
// locate resource |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
318 |
URL url = null; |
36511 | 319 |
try { |
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
320 |
url = AccessController.doPrivileged( |
36511 | 321 |
new PrivilegedExceptionAction<URL>() { |
322 |
@Override |
|
323 |
public URL run() throws IOException { |
|
324 |
Optional<URI> ouri = moduleReaderFor(mref).find(name); |
|
325 |
if (ouri.isPresent()) { |
|
326 |
try { |
|
327 |
return ouri.get().toURL(); |
|
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
328 |
} catch (MalformedURLException | |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
329 |
IllegalArgumentException e) { } |
36511 | 330 |
} |
331 |
return null; |
|
332 |
} |
|
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
333 |
}); |
36511 | 334 |
} catch (PrivilegedActionException pae) { |
335 |
throw (IOException) pae.getCause(); |
|
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
336 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
337 |
|
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
338 |
// check access with permissions restricted by ACC |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
339 |
if (url != null && System.getSecurityManager() != null) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
340 |
try { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
341 |
URL urlToCheck = url; |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
342 |
url = AccessController.doPrivileged( |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
343 |
new PrivilegedExceptionAction<URL>() { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
344 |
@Override |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
345 |
public URL run() throws IOException { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
346 |
return URLClassPath.checkURL(urlToCheck); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
347 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
348 |
}, acc); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
349 |
} catch (PrivilegedActionException pae) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
350 |
url = null; |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
351 |
} |
36511 | 352 |
} |
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
353 |
|
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
354 |
return url; |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
355 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
356 |
|
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
357 |
@Override |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
358 |
public URL findResource(String name) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
359 |
URL url = null; |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
360 |
String pn = ResourceHelper.getPackageName(name); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
361 |
LoadedModule module = localPackageToModule.get(pn); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
362 |
if (module != null) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
363 |
if (name.endsWith(".class") || isOpen(module.mref(), pn)) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
364 |
try { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
365 |
url = findResource(module.name(), name); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
366 |
} catch (IOException ioe) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
367 |
// ignore |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
368 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
369 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
370 |
} else { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
371 |
for (ModuleReference mref : nameToModule.values()) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
372 |
try { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
373 |
url = findResource(mref.descriptor().name(), name); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
374 |
if (url != null) |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
375 |
break; |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
376 |
} catch (IOException ioe) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
377 |
// ignore |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
378 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
379 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
380 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
381 |
return url; |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
382 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
383 |
|
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
384 |
@Override |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
385 |
public Enumeration<URL> findResources(String name) throws IOException { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
386 |
List<URL> urls = new ArrayList<>(); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
387 |
String pn = ResourceHelper.getPackageName(name); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
388 |
LoadedModule module = localPackageToModule.get(pn); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
389 |
if (module != null) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
390 |
if (name.endsWith(".class") || isOpen(module.mref(), pn)) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
391 |
try { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
392 |
URL url = findResource(module.name(), name); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
393 |
if (url != null) |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
394 |
urls.add(url); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
395 |
} catch (IOException ioe) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
396 |
// ignore |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
397 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
398 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
399 |
} else { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
400 |
for (ModuleReference mref : nameToModule.values()) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
401 |
try { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
402 |
URL url = findResource(mref.descriptor().name(), name); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
403 |
if (url != null) |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
404 |
urls.add(url); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
405 |
} catch (IOException ioe) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
406 |
// ignore |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
407 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
408 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
409 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
410 |
return Collections.enumeration(urls); |
36511 | 411 |
} |
412 |
||
413 |
||
414 |
// -- finding/loading classes |
|
415 |
||
416 |
/** |
|
417 |
* Finds the class with the specified binary name. |
|
418 |
*/ |
|
419 |
@Override |
|
420 |
protected Class<?> findClass(String cn) throws ClassNotFoundException { |
|
421 |
Class<?> c = null; |
|
422 |
LoadedModule loadedModule = findLoadedModule(cn); |
|
423 |
if (loadedModule != null) |
|
424 |
c = findClassInModuleOrNull(loadedModule, cn); |
|
425 |
if (c == null) |
|
426 |
throw new ClassNotFoundException(cn); |
|
427 |
return c; |
|
428 |
} |
|
429 |
||
430 |
/** |
|
431 |
* Finds the class with the specified binary name in a given module. |
|
432 |
* This method returns {@code null} if the class cannot be found. |
|
433 |
*/ |
|
434 |
@Override |
|
435 |
protected Class<?> findClass(String mn, String cn) { |
|
436 |
Class<?> c = null; |
|
437 |
LoadedModule loadedModule = findLoadedModule(cn); |
|
438 |
if (loadedModule != null && loadedModule.name().equals(mn)) |
|
439 |
c = findClassInModuleOrNull(loadedModule, cn); |
|
440 |
return c; |
|
441 |
} |
|
442 |
||
443 |
/** |
|
444 |
* Loads the class with the specified binary name. |
|
445 |
*/ |
|
446 |
@Override |
|
447 |
protected Class<?> loadClass(String cn, boolean resolve) |
|
448 |
throws ClassNotFoundException |
|
449 |
{ |
|
450 |
SecurityManager sm = System.getSecurityManager(); |
|
451 |
if (sm != null) { |
|
452 |
String pn = packageName(cn); |
|
453 |
if (!pn.isEmpty()) { |
|
454 |
sm.checkPackageAccess(pn); |
|
455 |
} |
|
456 |
} |
|
457 |
||
458 |
synchronized (getClassLoadingLock(cn)) { |
|
459 |
// check if already loaded |
|
460 |
Class<?> c = findLoadedClass(cn); |
|
461 |
||
462 |
if (c == null) { |
|
463 |
||
464 |
LoadedModule loadedModule = findLoadedModule(cn); |
|
465 |
||
466 |
if (loadedModule != null) { |
|
467 |
||
468 |
// class is in module defined to this class loader |
|
469 |
c = findClassInModuleOrNull(loadedModule, cn); |
|
470 |
||
471 |
} else { |
|
472 |
||
473 |
// type in another module or visible via the parent loader |
|
474 |
String pn = packageName(cn); |
|
475 |
ClassLoader loader = remotePackageToLoader.get(pn); |
|
476 |
if (loader == null) { |
|
477 |
// type not in a module read by any of the modules |
|
478 |
// defined to this loader, so delegate to parent |
|
479 |
// class loader |
|
480 |
loader = parent; |
|
481 |
} |
|
482 |
if (loader == null) { |
|
483 |
c = BootLoader.loadClassOrNull(cn); |
|
484 |
} else { |
|
485 |
c = loader.loadClass(cn); |
|
486 |
} |
|
487 |
||
488 |
} |
|
489 |
} |
|
490 |
||
491 |
if (c == null) |
|
492 |
throw new ClassNotFoundException(cn); |
|
493 |
||
494 |
if (resolve) |
|
495 |
resolveClass(c); |
|
496 |
||
497 |
return c; |
|
498 |
} |
|
499 |
} |
|
500 |
||
501 |
||
502 |
/** |
|
503 |
* Finds the class with the specified binary name if in a module |
|
504 |
* defined to this ClassLoader. |
|
505 |
* |
|
506 |
* @return the resulting Class or {@code null} if not found |
|
507 |
*/ |
|
508 |
private Class<?> findClassInModuleOrNull(LoadedModule loadedModule, String cn) { |
|
509 |
PrivilegedAction<Class<?>> pa = () -> defineClass(cn, loadedModule); |
|
510 |
return AccessController.doPrivileged(pa, acc); |
|
511 |
} |
|
512 |
||
513 |
/** |
|
514 |
* Defines the given binary class name to the VM, loading the class |
|
515 |
* bytes from the given module. |
|
516 |
* |
|
517 |
* @return the resulting Class or {@code null} if an I/O error occurs |
|
518 |
*/ |
|
519 |
private Class<?> defineClass(String cn, LoadedModule loadedModule) { |
|
520 |
ModuleReader reader = moduleReaderFor(loadedModule.mref()); |
|
521 |
||
522 |
try { |
|
523 |
// read class file |
|
524 |
String rn = cn.replace('.', '/').concat(".class"); |
|
525 |
ByteBuffer bb = reader.read(rn).orElse(null); |
|
526 |
if (bb == null) { |
|
527 |
// class not found |
|
528 |
return null; |
|
529 |
} |
|
530 |
||
531 |
try { |
|
532 |
return defineClass(cn, bb, loadedModule.codeSource()); |
|
533 |
} finally { |
|
534 |
reader.release(bb); |
|
535 |
} |
|
536 |
||
537 |
} catch (IOException ioe) { |
|
538 |
// TBD on how I/O errors should be propagated |
|
539 |
return null; |
|
540 |
} |
|
541 |
} |
|
542 |
||
543 |
||
544 |
// -- permissions |
|
545 |
||
546 |
/** |
|
547 |
* Returns the permissions for the given CodeSource. |
|
548 |
*/ |
|
549 |
@Override |
|
550 |
protected PermissionCollection getPermissions(CodeSource cs) { |
|
551 |
PermissionCollection perms = super.getPermissions(cs); |
|
552 |
||
553 |
URL url = cs.getLocation(); |
|
554 |
if (url == null) |
|
555 |
return perms; |
|
556 |
||
557 |
// add the permission to access the resource |
|
558 |
try { |
|
559 |
Permission p = url.openConnection().getPermission(); |
|
560 |
if (p != null) { |
|
561 |
// for directories then need recursive access |
|
562 |
if (p instanceof FilePermission) { |
|
563 |
String path = p.getName(); |
|
564 |
if (path.endsWith(File.separator)) { |
|
565 |
path += "-"; |
|
566 |
p = new FilePermission(path, "read"); |
|
567 |
} |
|
568 |
} |
|
569 |
perms.add(p); |
|
570 |
} |
|
571 |
} catch (IOException ioe) { } |
|
572 |
||
573 |
return perms; |
|
574 |
} |
|
575 |
||
576 |
||
577 |
// -- miscellaneous supporting methods |
|
578 |
||
579 |
/** |
|
580 |
* Find the candidate module for the given class name. |
|
581 |
* Returns {@code null} if none of the modules defined to this |
|
582 |
* class loader contain the API package for the class. |
|
583 |
*/ |
|
584 |
private LoadedModule findLoadedModule(String cn) { |
|
585 |
String pn = packageName(cn); |
|
586 |
return pn.isEmpty() ? null : localPackageToModule.get(pn); |
|
587 |
} |
|
588 |
||
589 |
/** |
|
590 |
* Returns the package name for the given class name |
|
591 |
*/ |
|
592 |
private String packageName(String cn) { |
|
593 |
int pos = cn.lastIndexOf('.'); |
|
594 |
return (pos < 0) ? "" : cn.substring(0, pos); |
|
595 |
} |
|
596 |
||
597 |
||
598 |
/** |
|
599 |
* Returns the ModuleReader for the given module. |
|
600 |
*/ |
|
601 |
private ModuleReader moduleReaderFor(ModuleReference mref) { |
|
602 |
return moduleToReader.computeIfAbsent(mref, m -> createModuleReader(mref)); |
|
603 |
} |
|
604 |
||
605 |
/** |
|
606 |
* Creates a ModuleReader for the given module. |
|
607 |
*/ |
|
608 |
private ModuleReader createModuleReader(ModuleReference mref) { |
|
609 |
try { |
|
610 |
return mref.open(); |
|
611 |
} catch (IOException e) { |
|
612 |
// Return a null module reader to avoid a future class load |
|
613 |
// attempting to open the module again. |
|
614 |
return new NullModuleReader(); |
|
615 |
} |
|
616 |
} |
|
617 |
||
618 |
/** |
|
619 |
* A ModuleReader that doesn't read any resources. |
|
620 |
*/ |
|
621 |
private static class NullModuleReader implements ModuleReader { |
|
622 |
@Override |
|
623 |
public Optional<URI> find(String name) { |
|
624 |
return Optional.empty(); |
|
625 |
} |
|
626 |
@Override |
|
41817
b90ad1de93ea
8168789: ModuleReader.list and ModuleFinder.of update
alanb
parents:
38571
diff
changeset
|
627 |
public Stream<String> list() { |
b90ad1de93ea
8168789: ModuleReader.list and ModuleFinder.of update
alanb
parents:
38571
diff
changeset
|
628 |
return Stream.empty(); |
b90ad1de93ea
8168789: ModuleReader.list and ModuleFinder.of update
alanb
parents:
38571
diff
changeset
|
629 |
} |
b90ad1de93ea
8168789: ModuleReader.list and ModuleFinder.of update
alanb
parents:
38571
diff
changeset
|
630 |
@Override |
36511 | 631 |
public void close() { |
632 |
throw new InternalError("Should not get here"); |
|
633 |
} |
|
634 |
} |
|
635 |
||
42338
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
636 |
/** |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
637 |
* Returns true if the given module opens the given package |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
638 |
* unconditionally. |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
639 |
* |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
640 |
* @implNote This method currently iterates over each of the open |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
641 |
* packages. This will be replaced once the ModuleDescriptor.Opens |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
642 |
* API is updated. |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
643 |
*/ |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
644 |
private boolean isOpen(ModuleReference mref, String pn) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
645 |
ModuleDescriptor descriptor = mref.descriptor(); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
646 |
if (descriptor.isOpen()) |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
647 |
return true; |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
648 |
for (ModuleDescriptor.Opens opens : descriptor.opens()) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
649 |
String source = opens.source(); |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
650 |
if (!opens.isQualified() && source.equals(pn)) { |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
651 |
return true; |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
652 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
653 |
} |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
654 |
return false; |
a60f280f803c
8169069: Module system implementation refresh (11/2016)
alanb
parents:
41817
diff
changeset
|
655 |
} |
36511 | 656 |
} |