-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Fb jpms - fixes for illegal access to private information in java.* packages. #1328
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
4fd4d01
3d64ffb
68a8c9c
9fd537a
edb8ba8
6733551
0a41e5c
0bf6ceb
bb7b412
e353c3e
d3c8c9f
60fd6cb
f20639a
c64d702
ec4150b
08d913e
a775d16
d951d0e
0d628cd
0e916b8
499a0a9
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -21,3 +21,6 @@ site-content | |
|
||
# jenv's version file | ||
.java-version | ||
|
||
# Netbeans | ||
nb-configuration.xml |
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -18,13 +18,62 @@ | |
package org.apache.commons.lang3.builder; | ||
|
||
import java.lang.reflect.Field; | ||
import java.time.Duration; | ||
import java.time.Instant; | ||
import java.time.LocalDate; | ||
import java.time.LocalDateTime; | ||
import java.time.LocalTime; | ||
import java.time.OffsetDateTime; | ||
import java.time.OffsetTime; | ||
import java.time.Period; | ||
import java.util.Arrays; | ||
import java.util.HashSet; | ||
import java.util.Map; | ||
import java.util.Objects; | ||
import java.util.Set; | ||
import java.util.concurrent.ConcurrentHashMap; | ||
|
||
/** | ||
* Package-private reflection code. | ||
*/ | ||
final class Reflection { | ||
|
||
/** | ||
* Some classes known to not be introspectable. | ||
* Those are classes where we would blow up when we try to access internal information via reflection. | ||
*/ | ||
private static final Set<Class> KNOWN_NON_INTROSPECTIBLE_CLASSES = new HashSet<>(); | ||
{ | ||
KNOWN_NON_INTROSPECTIBLE_CLASSES.addAll(Arrays.asList( | ||
Boolean.class, | ||
Character.class, | ||
String.class, | ||
Byte.class, | ||
Short.class, | ||
Integer.class, | ||
Long.class, | ||
Float.class, | ||
Double.class, | ||
java.util.Date.class, | ||
java.sql.Date.class, | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This is not specific to this PR: I don't think we should introduce a new JPMS module dependency, here on There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. yup true |
||
LocalDate.class, | ||
LocalDateTime.class, | ||
LocalTime.class, | ||
OffsetTime.class, | ||
OffsetDateTime.class, | ||
Instant.class, | ||
Duration.class, | ||
Period.class | ||
)); | ||
} | ||
|
||
/** | ||
* this is a cache for {@link #isNonIntrospectibleClass(Class)}. | ||
* Downside: this has a Class as key, so it *might* lock a ClassLoader. | ||
* TODO think about making this cache optional? Otoh we only cache classes we touch via the reflection methods. | ||
*/ | ||
private static Map<Class, Boolean> nonIntrospectibleClasses = new ConcurrentHashMap<>(); | ||
|
||
/** | ||
* Delegates to {@link Field#get(Object)} and rethrows {@link IllegalAccessException} as {@link IllegalArgumentException}. | ||
* | ||
|
@@ -41,4 +90,44 @@ static Object getUnchecked(final Field field, final Object obj) { | |
} | ||
} | ||
|
||
/** | ||
* Check whether the class internas of the given object can be accessed. This might return false in Java9 | ||
* and thus lead to a difference in behaviour if modularity is activated or not. | ||
* But it's the best we can do. | ||
* | ||
* @return {@code true} if the given class internas not accessible | ||
*/ | ||
static boolean isNonIntrospectibleClass(Object o) { | ||
return o != null && isNonIntrospectibleClass(o.getClass()); | ||
} | ||
|
||
/** | ||
* Check whether the given class internas can be accessed. This might return false in Java9 | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "internas" spelling |
||
* and thus lead to a difference in behaviour if modularity is activated or not. | ||
* But it's the best we can do. | ||
* | ||
* @return {@code true} if the given class internas not accessible | ||
*/ | ||
static boolean isNonIntrospectibleClass(Class<?> clazz) { | ||
if (KNOWN_NON_INTROSPECTIBLE_CLASSES.contains(clazz)) { | ||
return true; | ||
} | ||
Boolean isAccessible = nonIntrospectibleClasses.get(clazz); | ||
if (isAccessible != null) { | ||
return isAccessible; | ||
} | ||
try { | ||
final Field[] declaredFields = clazz.getDeclaredFields(); | ||
for (Field f : declaredFields) { | ||
f.setAccessible(true); | ||
} | ||
|
||
nonIntrospectibleClasses.put(clazz, false); | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This looks problematic since the map will grow uncontrollably, possibly until every class on your classpath gets referenced, there's no way to know really. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. this is a trade-off vs performance. it will only cache those classes which got hit in a reflection equals, toString, etc. Thus in practice it is a very limited set of classes I'd say. Can you think of a possible place where we can hold such a cache at least during a single invocation? Maybe inside the builder and handing the Map as another parameter to this method? |
||
return false; | ||
} catch (Exception e) { | ||
nonIntrospectibleClasses.put(clazz, true); | ||
return true; | ||
} | ||
} | ||
|
||
} |
Uh oh!
There was an error while loading. Please reload this page.