📄 serializablechecker.java
字号:
/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */package org.apache.wicket.util.io;import java.io.Externalizable;import java.io.IOException;import java.io.NotSerializableException;import java.io.ObjectOutput;import java.io.ObjectOutputStream;import java.io.ObjectStreamClass;import java.io.ObjectStreamField;import java.io.OutputStream;import java.io.Serializable;import java.lang.reflect.Field;import java.lang.reflect.InvocationTargetException;import java.lang.reflect.Method;import java.lang.reflect.Proxy;import java.util.Date;import java.util.HashMap;import java.util.IdentityHashMap;import java.util.Iterator;import java.util.LinkedList;import java.util.Map;import org.apache.wicket.Component;import org.apache.wicket.WicketRuntimeException;import org.slf4j.Logger;import org.slf4j.LoggerFactory;/** * Utility class that analyzes objects for non-serializable nodes. Construct, then call * {@link #check(Object)} with the object you want to check. When a non-serializable object is * found, a {@link WicketNotSerializableException} is thrown with a message that shows the trace up * to the not-serializable object. The exception is thrown for the first non-serializable instance * it encounters, so multiple problems will not be shown. * <p> * As this class depends heavily on JDK's serialization internals using introspection, analyzing may * not be possible, for instance when the runtime environment does not have sufficient rights to set * fields accessible that would otherwise be hidden. You should call * {@link SerializableChecker#isAvailable()} to see whether this class can operate properly. If it * doesn't, you should fall back to e.g. re-throwing/ printing the {@link NotSerializableException} * you probably got before using this class. * </p> * * @author eelcohillenius * @author Al Maw */public final class SerializableChecker extends ObjectOutputStream{ /** * Exception that is thrown when a non-serializable object was found. */ public static final class WicketNotSerializableException extends WicketRuntimeException { private static final long serialVersionUID = 1L; WicketNotSerializableException(String message, Throwable cause) { super(message, cause); } } /** * Does absolutely nothing. */ private static class NoopOutputStream extends OutputStream { public void close() { } public void flush() { } public void write(byte[] b) { } public void write(byte[] b, int i, int l) { } public void write(int b) { } } private static abstract class ObjectOutputAdaptor implements ObjectOutput { public void close() throws IOException { } public void flush() throws IOException { } public void write(byte[] b) throws IOException { } public void write(byte[] b, int off, int len) throws IOException { } public void write(int b) throws IOException { } public void writeBoolean(boolean v) throws IOException { } public void writeByte(int v) throws IOException { } public void writeBytes(String s) throws IOException { } public void writeChar(int v) throws IOException { } public void writeChars(String s) throws IOException { } public void writeDouble(double v) throws IOException { } public void writeFloat(float v) throws IOException { } public void writeInt(int v) throws IOException { } public void writeLong(long v) throws IOException { } public void writeShort(int v) throws IOException { } public void writeUTF(String str) throws IOException { } } /** Holds information about the field and the resulting object being traced. */ private static final class TraceSlot { private final String fieldDescription; private final Object object; TraceSlot(Object object, String fieldDescription) { super(); this.object = object; this.fieldDescription = fieldDescription; } public String toString() { return object.getClass() + " - " + fieldDescription; } } private static final NoopOutputStream DUMMY_OUTPUT_STREAM = new NoopOutputStream(); /** log. */ private static final Logger log = LoggerFactory.getLogger(SerializableChecker.class); /** Whether we can execute the tests. If false, check will just return. */ private static boolean available = true; // this hack - accessing the serialization API through introspection - is // the only way to use Java serialization for our purposes without writing // the whole thing from scratch (and even then, it would be limited). This // way of working is of course fragile for internal API changes, but as we // do an extra check on availability and we report when we can't use this // introspection fu, we'll find out soon enough and clients on this class // can fall back on Java's default exception for serialization errors (which // sucks and is the main reason for this attempt). private static final Method LOOKUP_METHOD; private static final Method GET_CLASS_DATA_LAYOUT_METHOD; private static final Method GET_NUM_OBJ_FIELDS_METHOD; private static final Method GET_OBJ_FIELD_VALUES_METHOD; private static final Method GET_FIELD_METHOD; private static final Method HAS_WRITE_REPLACE_METHOD_METHOD; private static final Method INVOKE_WRITE_REPLACE_METHOD; static { try { LOOKUP_METHOD = ObjectStreamClass.class.getDeclaredMethod("lookup", new Class[] { Class.class, Boolean.TYPE }); LOOKUP_METHOD.setAccessible(true); GET_CLASS_DATA_LAYOUT_METHOD = ObjectStreamClass.class.getDeclaredMethod( "getClassDataLayout", null); GET_CLASS_DATA_LAYOUT_METHOD.setAccessible(true); GET_NUM_OBJ_FIELDS_METHOD = ObjectStreamClass.class.getDeclaredMethod( "getNumObjFields", null); GET_NUM_OBJ_FIELDS_METHOD.setAccessible(true); GET_OBJ_FIELD_VALUES_METHOD = ObjectStreamClass.class.getDeclaredMethod( "getObjFieldValues", new Class[] { Object.class, Object[].class }); GET_OBJ_FIELD_VALUES_METHOD.setAccessible(true); GET_FIELD_METHOD = ObjectStreamField.class.getDeclaredMethod("getField", null); GET_FIELD_METHOD.setAccessible(true); HAS_WRITE_REPLACE_METHOD_METHOD = ObjectStreamClass.class.getDeclaredMethod( "hasWriteReplaceMethod", null); HAS_WRITE_REPLACE_METHOD_METHOD.setAccessible(true); INVOKE_WRITE_REPLACE_METHOD = ObjectStreamClass.class.getDeclaredMethod( "invokeWriteReplace", new Class[] { Object.class }); INVOKE_WRITE_REPLACE_METHOD.setAccessible(true); } catch (SecurityException e) { available = false; throw new RuntimeException(e); } catch (NoSuchMethodException e) { available = false; throw new RuntimeException(e); } } /** * Gets whether we can execute the tests. If false, calling {@link #check(Object)} will just * return and you are advised to rely on the {@link NotSerializableException}. Clients are * advised to call this method prior to calling the check method. * * @return whether security settings and underlying API etc allow for accessing the * serialization API using introspection */ public static boolean isAvailable() { return available; } /** object stack that with the trace path. */ private final LinkedList traceStack = new LinkedList(); /** set for checking circular references. */ private final Map checked = new IdentityHashMap(); /** string stack with current names pushed. */ private final LinkedList nameStack = new LinkedList(); /** root object being analyzed. */ private Object root; /** cache for classes - writeObject methods. */ private final Map writeObjectMethodCache = new HashMap(); /** current simple field name. */ private String simpleName = ""; /** current full field description. */ private String fieldDescription; /** Exception that should be set as the cause when throwing a new exception. */ private final NotSerializableException exception; /** * Construct. * * @param exception * exception that should be set as the cause when throwing a new exception * * @throws IOException */ public SerializableChecker(NotSerializableException exception) throws IOException { this.exception = exception; } /** * @see java.io.ObjectOutputStream#reset() */ public void reset() throws IOException { root = null; checked.clear(); fieldDescription = null; simpleName = null; traceStack.clear(); nameStack.clear(); writeObjectMethodCache.clear(); } private void check(Object obj) { if (obj == null) { return; } Class cls = obj.getClass(); nameStack.add(simpleName); traceStack.add(new TraceSlot(obj, fieldDescription)); if (!(obj instanceof Serializable) && (!Proxy.isProxyClass(cls)))
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -