| /* |
| * Copyright (c) 1996, 2008, Oracle and/or its affiliates. All rights reserved. |
| * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
| * |
| * This code is free software; you can redistribute it and/or modify it |
| * under the terms of the GNU General Public License version 2 only, as |
| * published by the Free Software Foundation. Oracle designates this |
| * particular file as subject to the "Classpath" exception as provided |
| * by Oracle in the LICENSE file that accompanied this code. |
| * |
| * This code is distributed in the hope that it will be useful, but WITHOUT |
| * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
| * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
| * version 2 for more details (a copy is included in the LICENSE file that |
| * accompanied this code). |
| * |
| * You should have received a copy of the GNU General Public License version |
| * 2 along with this work; if not, write to the Free Software Foundation, |
| * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
| * |
| * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
| * or visit www.oracle.com if you need additional information or have any |
| * questions. |
| */ |
| |
| package sun.rmi.server; |
| |
| import java.io.File; |
| import java.io.FilePermission; |
| import java.io.IOException; |
| import java.lang.ref.ReferenceQueue; |
| import java.lang.ref.SoftReference; |
| import java.lang.ref.WeakReference; |
| import java.lang.reflect.Modifier; |
| import java.lang.reflect.Proxy; |
| import java.net.JarURLConnection; |
| import java.net.MalformedURLException; |
| import java.net.SocketPermission; |
| import java.net.URL; |
| import java.net.URLClassLoader; |
| import java.net.URLConnection; |
| import java.security.AccessControlContext; |
| import java.security.CodeSource; |
| import java.security.Permission; |
| import java.security.Permissions; |
| import java.security.PermissionCollection; |
| import java.security.Policy; |
| import java.security.ProtectionDomain; |
| import java.rmi.server.LogStream; |
| import java.util.Arrays; |
| import java.util.Collections; |
| import java.util.Enumeration; |
| import java.util.HashMap; |
| import java.util.IdentityHashMap; |
| import java.util.Map; |
| import java.util.StringTokenizer; |
| import java.util.WeakHashMap; |
| import sun.reflect.misc.ReflectUtil; |
| import sun.rmi.runtime.Log; |
| import sun.security.action.GetPropertyAction; |
| |
| /** |
| * <code>LoaderHandler</code> provides the implementation of the static |
| * methods of the <code>java.rmi.server.RMIClassLoader</code> class. |
| * |
| * @author Ann Wollrath |
| * @author Peter Jones |
| * @author Laird Dornin |
| */ |
| public final class LoaderHandler { |
| |
| /** RMI class loader log level */ |
| static final int logLevel = LogStream.parseLevel( |
| java.security.AccessController.doPrivileged( |
| new GetPropertyAction("sun.rmi.loader.logLevel"))); |
| |
| /* loader system log */ |
| static final Log loaderLog = |
| Log.getLog("sun.rmi.loader", "loader", LoaderHandler.logLevel); |
| |
| /** |
| * value of "java.rmi.server.codebase" property, as cached at class |
| * initialization time. It may contain malformed URLs. |
| */ |
| private static String codebaseProperty = null; |
| static { |
| String prop = java.security.AccessController.doPrivileged( |
| new GetPropertyAction("java.rmi.server.codebase")); |
| if (prop != null && prop.trim().length() > 0) { |
| codebaseProperty = prop; |
| } |
| } |
| |
| /** list of URLs represented by the codebase property, if valid */ |
| private static URL[] codebaseURLs = null; |
| |
| /** table of class loaders that use codebase property for annotation */ |
| private static final Map<ClassLoader, Void> codebaseLoaders = |
| Collections.synchronizedMap(new IdentityHashMap<ClassLoader, Void>(5)); |
| static { |
| for (ClassLoader codebaseLoader = ClassLoader.getSystemClassLoader(); |
| codebaseLoader != null; |
| codebaseLoader = codebaseLoader.getParent()) |
| { |
| codebaseLoaders.put(codebaseLoader, null); |
| } |
| } |
| |
| /** |
| * table mapping codebase URL path and context class loader pairs |
| * to class loader instances. Entries hold class loaders with weak |
| * references, so this table does not prevent loaders from being |
| * garbage collected. |
| */ |
| private static final HashMap<LoaderKey, LoaderEntry> loaderTable |
| = new HashMap<>(5); |
| |
| /** reference queue for cleared class loader entries */ |
| private static final ReferenceQueue<Loader> refQueue |
| = new ReferenceQueue<>(); |
| |
| /* |
| * Disallow anyone from creating one of these. |
| */ |
| private LoaderHandler() {} |
| |
| /** |
| * Returns an array of URLs initialized with the value of the |
| * java.rmi.server.codebase property as the URL path. |
| */ |
| private static synchronized URL[] getDefaultCodebaseURLs() |
| throws MalformedURLException |
| { |
| /* |
| * If it hasn't already been done, convert the codebase property |
| * into an array of URLs; this may throw a MalformedURLException. |
| */ |
| if (codebaseURLs == null) { |
| if (codebaseProperty != null) { |
| codebaseURLs = pathToURLs(codebaseProperty); |
| } else { |
| codebaseURLs = new URL[0]; |
| } |
| } |
| return codebaseURLs; |
| } |
| |
| /** |
| * Load a class from a network location (one or more URLs), |
| * but first try to resolve the named class through the given |
| * "default loader". |
| */ |
| public static Class<?> loadClass(String codebase, String name, |
| ClassLoader defaultLoader) |
| throws MalformedURLException, ClassNotFoundException |
| { |
| if (loaderLog.isLoggable(Log.BRIEF)) { |
| loaderLog.log(Log.BRIEF, |
| "name = \"" + name + "\", " + |
| "codebase = \"" + (codebase != null ? codebase : "") + "\"" + |
| (defaultLoader != null ? |
| ", defaultLoader = " + defaultLoader : "")); |
| } |
| |
| URL[] urls; |
| if (codebase != null) { |
| urls = pathToURLs(codebase); |
| } else { |
| urls = getDefaultCodebaseURLs(); |
| } |
| |
| if (defaultLoader != null) { |
| try { |
| Class<?> c = loadClassForName(name, false, defaultLoader); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| loaderLog.log(Log.VERBOSE, |
| "class \"" + name + "\" found via defaultLoader, " + |
| "defined by " + c.getClassLoader()); |
| } |
| return c; |
| } catch (ClassNotFoundException e) { |
| } |
| } |
| |
| return loadClass(urls, name); |
| } |
| |
| /** |
| * Returns the class annotation (representing the location for |
| * a class) that RMI will use to annotate the call stream when |
| * marshalling objects of the given class. |
| */ |
| public static String getClassAnnotation(Class<?> cl) { |
| String name = cl.getName(); |
| |
| /* |
| * Class objects for arrays of primitive types never need an |
| * annotation, because they never need to be (or can be) downloaded. |
| * |
| * REMIND: should we (not) be annotating classes that are in |
| * "java.*" packages? |
| */ |
| int nameLength = name.length(); |
| if (nameLength > 0 && name.charAt(0) == '[') { |
| // skip past all '[' characters (see bugid 4211906) |
| int i = 1; |
| while (nameLength > i && name.charAt(i) == '[') { |
| i++; |
| } |
| if (nameLength > i && name.charAt(i) != 'L') { |
| return null; |
| } |
| } |
| |
| /* |
| * Get the class's class loader. If it is null, the system class |
| * loader, an ancestor of the base class loader (such as the loader |
| * for installed extensions), return the value of the |
| * "java.rmi.server.codebase" property. |
| */ |
| ClassLoader loader = cl.getClassLoader(); |
| if (loader == null || codebaseLoaders.containsKey(loader)) { |
| return codebaseProperty; |
| } |
| |
| /* |
| * Get the codebase URL path for the class loader, if it supports |
| * such a notion (i.e., if it is a URLClassLoader or subclass). |
| */ |
| String annotation = null; |
| if (loader instanceof Loader) { |
| /* |
| * If the class loader is one of our RMI class loaders, we have |
| * already computed the class annotation string, and no |
| * permissions are required to know the URLs. |
| */ |
| annotation = ((Loader) loader).getClassAnnotation(); |
| |
| } else if (loader instanceof URLClassLoader) { |
| try { |
| URL[] urls = ((URLClassLoader) loader).getURLs(); |
| if (urls != null) { |
| /* |
| * If the class loader is not one of our RMI class loaders, |
| * we must verify that the current access control context |
| * has permission to know all of these URLs. |
| */ |
| SecurityManager sm = System.getSecurityManager(); |
| if (sm != null) { |
| Permissions perms = new Permissions(); |
| for (int i = 0; i < urls.length; i++) { |
| Permission p = |
| urls[i].openConnection().getPermission(); |
| if (p != null) { |
| if (!perms.implies(p)) { |
| sm.checkPermission(p); |
| perms.add(p); |
| } |
| } |
| } |
| } |
| |
| annotation = urlsToPath(urls); |
| } |
| } catch (SecurityException | IOException e) { |
| /* |
| * SecurityException: If access was denied to the knowledge of |
| * the class loader's URLs, fall back to the default behavior. |
| * |
| * IOException: This shouldn't happen, although it is declared |
| * to be thrown by openConnection() and getPermission(). If it |
| * does happen, forget about this class loader's URLs and |
| * fall back to the default behavior. |
| */ |
| } |
| } |
| |
| if (annotation != null) { |
| return annotation; |
| } else { |
| return codebaseProperty; // REMIND: does this make sense?? |
| } |
| } |
| |
| /** |
| * Returns a classloader that loads classes from the given codebase URL |
| * path. The parent classloader of the returned classloader is the |
| * context class loader. |
| */ |
| public static ClassLoader getClassLoader(String codebase) |
| throws MalformedURLException |
| { |
| ClassLoader parent = getRMIContextClassLoader(); |
| |
| URL[] urls; |
| if (codebase != null) { |
| urls = pathToURLs(codebase); |
| } else { |
| urls = getDefaultCodebaseURLs(); |
| } |
| |
| /* |
| * If there is a security manager, the current access control |
| * context must have the "getClassLoader" RuntimePermission. |
| */ |
| SecurityManager sm = System.getSecurityManager(); |
| if (sm != null) { |
| sm.checkPermission(new RuntimePermission("getClassLoader")); |
| } else { |
| /* |
| * But if no security manager is set, disable access to |
| * RMI class loaders and simply return the parent loader. |
| */ |
| return parent; |
| } |
| |
| Loader loader = lookupLoader(urls, parent); |
| |
| /* |
| * Verify that the caller has permission to access this loader. |
| */ |
| if (loader != null) { |
| loader.checkPermissions(); |
| } |
| |
| return loader; |
| } |
| |
| /** |
| * Return the security context of the given class loader. |
| */ |
| public static Object getSecurityContext(ClassLoader loader) { |
| /* |
| * REMIND: This is a bogus JDK1.1-compatible implementation. |
| * This method should never be called by application code anyway |
| * (hence the deprecation), but should it do something different |
| * and perhaps more useful, like return a String or a URL[]? |
| */ |
| if (loader instanceof Loader) { |
| URL[] urls = ((Loader) loader).getURLs(); |
| if (urls.length > 0) { |
| return urls[0]; |
| } |
| } |
| return null; |
| } |
| |
| /** |
| * Register a class loader as one whose classes should always be |
| * annotated with the value of the "java.rmi.server.codebase" property. |
| */ |
| public static void registerCodebaseLoader(ClassLoader loader) { |
| codebaseLoaders.put(loader, null); |
| } |
| |
| /** |
| * Load a class from the RMI class loader corresponding to the given |
| * codebase URL path in the current execution context. |
| */ |
| private static Class<?> loadClass(URL[] urls, String name) |
| throws ClassNotFoundException |
| { |
| ClassLoader parent = getRMIContextClassLoader(); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| loaderLog.log(Log.VERBOSE, |
| "(thread context class loader: " + parent + ")"); |
| } |
| |
| /* |
| * If no security manager is set, disable access to RMI class |
| * loaders and simply delegate request to the parent loader |
| * (see bugid 4140511). |
| */ |
| SecurityManager sm = System.getSecurityManager(); |
| if (sm == null) { |
| try { |
| Class<?> c = loadClassForName(name, false, parent); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| loaderLog.log(Log.VERBOSE, |
| "class \"" + name + "\" found via " + |
| "thread context class loader " + |
| "(no security manager: codebase disabled), " + |
| "defined by " + c.getClassLoader()); |
| } |
| return c; |
| } catch (ClassNotFoundException e) { |
| if (loaderLog.isLoggable(Log.BRIEF)) { |
| loaderLog.log(Log.BRIEF, |
| "class \"" + name + "\" not found via " + |
| "thread context class loader " + |
| "(no security manager: codebase disabled)", e); |
| } |
| throw new ClassNotFoundException(e.getMessage() + |
| " (no security manager: RMI class loader disabled)", |
| e.getException()); |
| } |
| } |
| |
| /* |
| * Get or create the RMI class loader for this codebase URL path |
| * and parent class loader pair. |
| */ |
| Loader loader = lookupLoader(urls, parent); |
| |
| try { |
| if (loader != null) { |
| /* |
| * Verify that the caller has permission to access this loader. |
| */ |
| loader.checkPermissions(); |
| } |
| } catch (SecurityException e) { |
| /* |
| * If the current access control context does not have permission |
| * to access all of the URLs in the codebase path, wrap the |
| * resulting security exception in a ClassNotFoundException, so |
| * the caller can handle this outcome just like any other class |
| * loading failure (see bugid 4146529). |
| */ |
| try { |
| /* |
| * But first, check to see if the named class could have been |
| * resolved without the security-offending codebase anyway; |
| * if so, return successfully (see bugids 4191926 & 4349670). |
| */ |
| Class<?> c = loadClassForName(name, false, parent); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| loaderLog.log(Log.VERBOSE, |
| "class \"" + name + "\" found via " + |
| "thread context class loader " + |
| "(access to codebase denied), " + |
| "defined by " + c.getClassLoader()); |
| } |
| return c; |
| } catch (ClassNotFoundException unimportant) { |
| /* |
| * Presumably the security exception is the more important |
| * exception to report in this case. |
| */ |
| if (loaderLog.isLoggable(Log.BRIEF)) { |
| loaderLog.log(Log.BRIEF, |
| "class \"" + name + "\" not found via " + |
| "thread context class loader " + |
| "(access to codebase denied)", e); |
| } |
| throw new ClassNotFoundException( |
| "access to class loader denied", e); |
| } |
| } |
| |
| try { |
| Class<?> c = loadClassForName(name, false, loader); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| loaderLog.log(Log.VERBOSE, |
| "class \"" + name + "\" " + "found via codebase, " + |
| "defined by " + c.getClassLoader()); |
| } |
| return c; |
| } catch (ClassNotFoundException e) { |
| if (loaderLog.isLoggable(Log.BRIEF)) { |
| loaderLog.log(Log.BRIEF, |
| "class \"" + name + "\" not found via codebase", e); |
| } |
| throw e; |
| } |
| } |
| |
| /** |
| * Define and return a dynamic proxy class in a class loader with |
| * URLs supplied in the given location. The proxy class will |
| * implement interface classes named by the given array of |
| * interface names. |
| */ |
| public static Class<?> loadProxyClass(String codebase, String[] interfaces, |
| ClassLoader defaultLoader) |
| throws MalformedURLException, ClassNotFoundException |
| { |
| if (loaderLog.isLoggable(Log.BRIEF)) { |
| loaderLog.log(Log.BRIEF, |
| "interfaces = " + Arrays.asList(interfaces) + ", " + |
| "codebase = \"" + (codebase != null ? codebase : "") + "\"" + |
| (defaultLoader != null ? |
| ", defaultLoader = " + defaultLoader : "")); |
| } |
| |
| /* |
| * This method uses a fairly complex algorithm to load the |
| * proxy class and its interface classes in order to maximize |
| * the likelihood that the proxy's codebase annotation will be |
| * preserved. The algorithm is (assuming that all of the |
| * proxy interface classes are public): |
| * |
| * If the default loader is not null, try to load the proxy |
| * interfaces through that loader. If the interfaces can be |
| * loaded in that loader, try to define the proxy class in an |
| * RMI class loader (child of the context class loader) before |
| * trying to define the proxy in the default loader. If the |
| * attempt to define the proxy class succeeds, the codebase |
| * annotation is preserved. If the attempt fails, try to |
| * define the proxy class in the default loader. |
| * |
| * If the interface classes can not be loaded from the default |
| * loader or the default loader is null, try to load them from |
| * the RMI class loader. Then try to define the proxy class |
| * in the RMI class loader. |
| * |
| * Additionally, if any of the proxy interface classes are not |
| * public, all of the non-public interfaces must reside in the |
| * same class loader or it will be impossible to define the |
| * proxy class (an IllegalAccessError will be thrown). An |
| * attempt to load the interfaces from the default loader is |
| * made. If the attempt fails, a second attempt will be made |
| * to load the interfaces from the RMI loader. If all of the |
| * non-public interfaces classes do reside in the same class |
| * loader, then we attempt to define the proxy class in the |
| * class loader of the non-public interfaces. No other |
| * attempt to define the proxy class will be made. |
| */ |
| ClassLoader parent = getRMIContextClassLoader(); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| loaderLog.log(Log.VERBOSE, |
| "(thread context class loader: " + parent + ")"); |
| } |
| |
| URL[] urls; |
| if (codebase != null) { |
| urls = pathToURLs(codebase); |
| } else { |
| urls = getDefaultCodebaseURLs(); |
| } |
| |
| /* |
| * If no security manager is set, disable access to RMI class |
| * loaders and use the would-de parent instead. |
| */ |
| SecurityManager sm = System.getSecurityManager(); |
| if (sm == null) { |
| try { |
| Class<?> c = loadProxyClass(interfaces, defaultLoader, parent, |
| false); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| loaderLog.log(Log.VERBOSE, |
| "(no security manager: codebase disabled) " + |
| "proxy class defined by " + c.getClassLoader()); |
| } |
| return c; |
| } catch (ClassNotFoundException e) { |
| if (loaderLog.isLoggable(Log.BRIEF)) { |
| loaderLog.log(Log.BRIEF, |
| "(no security manager: codebase disabled) " + |
| "proxy class resolution failed", e); |
| } |
| throw new ClassNotFoundException(e.getMessage() + |
| " (no security manager: RMI class loader disabled)", |
| e.getException()); |
| } |
| } |
| |
| /* |
| * Get or create the RMI class loader for this codebase URL path |
| * and parent class loader pair. |
| */ |
| Loader loader = lookupLoader(urls, parent); |
| |
| try { |
| if (loader != null) { |
| /* |
| * Verify that the caller has permission to access this loader. |
| */ |
| loader.checkPermissions(); |
| } |
| } catch (SecurityException e) { |
| /* |
| * If the current access control context does not have permission |
| * to access all of the URLs in the codebase path, wrap the |
| * resulting security exception in a ClassNotFoundException, so |
| * the caller can handle this outcome just like any other class |
| * loading failure (see bugid 4146529). |
| */ |
| try { |
| /* |
| * But first, check to see if the proxy class could have been |
| * resolved without the security-offending codebase anyway; |
| * if so, return successfully (see bugids 4191926 & 4349670). |
| */ |
| Class<?> c = loadProxyClass(interfaces, defaultLoader, parent, |
| false); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| loaderLog.log(Log.VERBOSE, |
| "(access to codebase denied) " + |
| "proxy class defined by " + c.getClassLoader()); |
| } |
| return c; |
| } catch (ClassNotFoundException unimportant) { |
| /* |
| * Presumably the security exception is the more important |
| * exception to report in this case. |
| */ |
| if (loaderLog.isLoggable(Log.BRIEF)) { |
| loaderLog.log(Log.BRIEF, |
| "(access to codebase denied) " + |
| "proxy class resolution failed", e); |
| } |
| throw new ClassNotFoundException( |
| "access to class loader denied", e); |
| } |
| } |
| |
| try { |
| Class<?> c = loadProxyClass(interfaces, defaultLoader, loader, true); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| loaderLog.log(Log.VERBOSE, |
| "proxy class defined by " + c.getClassLoader()); |
| } |
| return c; |
| } catch (ClassNotFoundException e) { |
| if (loaderLog.isLoggable(Log.BRIEF)) { |
| loaderLog.log(Log.BRIEF, |
| "proxy class resolution failed", e); |
| } |
| throw e; |
| } |
| } |
| |
| /** |
| * Define a proxy class in the default loader if appropriate. |
| * Define the class in an RMI class loader otherwise. The proxy |
| * class will implement classes which are named in the supplied |
| * interfaceNames. |
| */ |
| private static Class<?> loadProxyClass(String[] interfaceNames, |
| ClassLoader defaultLoader, |
| ClassLoader codebaseLoader, |
| boolean preferCodebase) |
| throws ClassNotFoundException |
| { |
| ClassLoader proxyLoader = null; |
| Class<?>[] classObjs = new Class<?>[interfaceNames.length]; |
| boolean[] nonpublic = { false }; |
| |
| defaultLoaderCase: |
| if (defaultLoader != null) { |
| try { |
| proxyLoader = |
| loadProxyInterfaces(interfaceNames, defaultLoader, |
| classObjs, nonpublic); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| ClassLoader[] definingLoaders = |
| new ClassLoader[classObjs.length]; |
| for (int i = 0; i < definingLoaders.length; i++) { |
| definingLoaders[i] = classObjs[i].getClassLoader(); |
| } |
| loaderLog.log(Log.VERBOSE, |
| "proxy interfaces found via defaultLoader, " + |
| "defined by " + Arrays.asList(definingLoaders)); |
| } |
| } catch (ClassNotFoundException e) { |
| break defaultLoaderCase; |
| } |
| if (!nonpublic[0]) { |
| if (preferCodebase) { |
| try { |
| return Proxy.getProxyClass(codebaseLoader, classObjs); |
| } catch (IllegalArgumentException e) { |
| } |
| } |
| proxyLoader = defaultLoader; |
| } |
| return loadProxyClass(proxyLoader, classObjs); |
| } |
| |
| nonpublic[0] = false; |
| proxyLoader = loadProxyInterfaces(interfaceNames, codebaseLoader, |
| classObjs, nonpublic); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| ClassLoader[] definingLoaders = new ClassLoader[classObjs.length]; |
| for (int i = 0; i < definingLoaders.length; i++) { |
| definingLoaders[i] = classObjs[i].getClassLoader(); |
| } |
| loaderLog.log(Log.VERBOSE, |
| "proxy interfaces found via codebase, " + |
| "defined by " + Arrays.asList(definingLoaders)); |
| } |
| if (!nonpublic[0]) { |
| proxyLoader = codebaseLoader; |
| } |
| return loadProxyClass(proxyLoader, classObjs); |
| } |
| |
| /** |
| * Define a proxy class in the given class loader. The proxy |
| * class will implement the given interfaces Classes. |
| */ |
| private static Class<?> loadProxyClass(ClassLoader loader, Class[] interfaces) |
| throws ClassNotFoundException |
| { |
| try { |
| return Proxy.getProxyClass(loader, interfaces); |
| } catch (IllegalArgumentException e) { |
| throw new ClassNotFoundException( |
| "error creating dynamic proxy class", e); |
| } |
| } |
| |
| /* |
| * Load Class objects for the names in the interfaces array fron |
| * the given class loader. |
| * |
| * We pass classObjs and nonpublic arrays to avoid needing a |
| * multi-element return value. nonpublic is an array to enable |
| * the method to take a boolean argument by reference. |
| * |
| * nonpublic array is needed to signal when the return value of |
| * this method should be used as the proxy class loader. Because |
| * null represents a valid class loader, that value is |
| * insufficient to signal that the return value should not be used |
| * as the proxy class loader. |
| */ |
| private static ClassLoader loadProxyInterfaces(String[] interfaces, |
| ClassLoader loader, |
| Class[] classObjs, |
| boolean[] nonpublic) |
| throws ClassNotFoundException |
| { |
| /* loader of a non-public interface class */ |
| ClassLoader nonpublicLoader = null; |
| |
| for (int i = 0; i < interfaces.length; i++) { |
| Class<?> cl = |
| (classObjs[i] = loadClassForName(interfaces[i], false, loader)); |
| |
| if (!Modifier.isPublic(cl.getModifiers())) { |
| ClassLoader current = cl.getClassLoader(); |
| if (loaderLog.isLoggable(Log.VERBOSE)) { |
| loaderLog.log(Log.VERBOSE, |
| "non-public interface \"" + interfaces[i] + |
| "\" defined by " + current); |
| } |
| if (!nonpublic[0]) { |
| nonpublicLoader = current; |
| nonpublic[0] = true; |
| } else if (current != nonpublicLoader) { |
| throw new IllegalAccessError( |
| "non-public interfaces defined in different " + |
| "class loaders"); |
| } |
| } |
| } |
| return nonpublicLoader; |
| } |
| |
| /** |
| * Convert a string containing a space-separated list of URLs into a |
| * corresponding array of URL objects, throwing a MalformedURLException |
| * if any of the URLs are invalid. |
| */ |
| private static URL[] pathToURLs(String path) |
| throws MalformedURLException |
| { |
| synchronized (pathToURLsCache) { |
| Object[] v = pathToURLsCache.get(path); |
| if (v != null) { |
| return ((URL[])v[0]); |
| } |
| } |
| StringTokenizer st = new StringTokenizer(path); // divide by spaces |
| URL[] urls = new URL[st.countTokens()]; |
| for (int i = 0; st.hasMoreTokens(); i++) { |
| urls[i] = new URL(st.nextToken()); |
| } |
| synchronized (pathToURLsCache) { |
| pathToURLsCache.put(path, |
| new Object[] {urls, new SoftReference<String>(path)}); |
| } |
| return urls; |
| } |
| |
| /** map from weak(key=string) to [URL[], soft(key)] */ |
| private static final Map<String, Object[]> pathToURLsCache |
| = new WeakHashMap<>(5); |
| |
| /** |
| * Convert an array of URL objects into a corresponding string |
| * containing a space-separated list of URLs. |
| * |
| * Note that if the array has zero elements, the return value is |
| * null, not the empty string. |
| */ |
| private static String urlsToPath(URL[] urls) { |
| if (urls.length == 0) { |
| return null; |
| } else if (urls.length == 1) { |
| return urls[0].toExternalForm(); |
| } else { |
| StringBuffer path = new StringBuffer(urls[0].toExternalForm()); |
| for (int i = 1; i < urls.length; i++) { |
| path.append(' '); |
| path.append(urls[i].toExternalForm()); |
| } |
| return path.toString(); |
| } |
| } |
| |
| /** |
| * Return the class loader to be used as the parent for an RMI class |
| * loader used in the current execution context. |
| */ |
| private static ClassLoader getRMIContextClassLoader() { |
| /* |
| * The current implementation simply uses the current thread's |
| * context class loader. |
| */ |
| return Thread.currentThread().getContextClassLoader(); |
| } |
| |
| /** |
| * Look up the RMI class loader for the given codebase URL path |
| * and the given parent class loader. A new class loader instance |
| * will be created and returned if no match is found. |
| */ |
| private static Loader lookupLoader(final URL[] urls, |
| final ClassLoader parent) |
| { |
| /* |
| * If the requested codebase URL path is empty, the supplied |
| * parent class loader will be sufficient. |
| * |
| * REMIND: To be conservative, this optimization is commented out |
| * for now so that it does not open a security hole in the future |
| * by providing untrusted code with direct access to the public |
| * loadClass() method of a class loader instance that it cannot |
| * get a reference to. (It's an unlikely optimization anyway.) |
| * |
| * if (urls.length == 0) { |
| * return parent; |
| * } |
| */ |
| |
| LoaderEntry entry; |
| Loader loader; |
| |
| synchronized (LoaderHandler.class) { |
| /* |
| * Take this opportunity to remove from the table entries |
| * whose weak references have been cleared. |
| */ |
| while ((entry = (LoaderEntry) refQueue.poll()) != null) { |
| if (!entry.removed) { // ignore entries removed below |
| loaderTable.remove(entry.key); |
| } |
| } |
| |
| /* |
| * Look up the codebase URL path and parent class loader pair |
| * in the table of RMI class loaders. |
| */ |
| LoaderKey key = new LoaderKey(urls, parent); |
| entry = loaderTable.get(key); |
| |
| if (entry == null || (loader = entry.get()) == null) { |
| /* |
| * If entry was in table but it's weak reference was cleared, |
| * remove it from the table and mark it as explicitly cleared, |
| * so that new matching entry that we put in the table will |
| * not be erroneously removed when this entry is processed |
| * from the weak reference queue. |
| */ |
| if (entry != null) { |
| loaderTable.remove(key); |
| entry.removed = true; |
| } |
| |
| /* |
| * A matching loader was not found, so create a new class |
| * loader instance for the requested codebase URL path and |
| * parent class loader. The instance is created within an |
| * access control context retricted to the permissions |
| * necessary to load classes from its codebase URL path. |
| */ |
| AccessControlContext acc = getLoaderAccessControlContext(urls); |
| loader = java.security.AccessController.doPrivileged( |
| new java.security.PrivilegedAction<Loader>() { |
| public Loader run() { |
| return new Loader(urls, parent); |
| } |
| }, acc); |
| |
| /* |
| * Finally, create an entry to hold the new loader with a |
| * weak reference and store it in the table with the key. |
| */ |
| entry = new LoaderEntry(key, loader); |
| loaderTable.put(key, entry); |
| } |
| } |
| |
| return loader; |
| } |
| |
| /** |
| * LoaderKey holds a codebase URL path and parent class loader pair |
| * used to look up RMI class loader instances in its class loader cache. |
| */ |
| private static class LoaderKey { |
| |
| private URL[] urls; |
| |
| private ClassLoader parent; |
| |
| private int hashValue; |
| |
| public LoaderKey(URL[] urls, ClassLoader parent) { |
| this.urls = urls; |
| this.parent = parent; |
| |
| if (parent != null) { |
| hashValue = parent.hashCode(); |
| } |
| for (int i = 0; i < urls.length; i++) { |
| hashValue ^= urls[i].hashCode(); |
| } |
| } |
| |
| public int hashCode() { |
| return hashValue; |
| } |
| |
| public boolean equals(Object obj) { |
| if (obj instanceof LoaderKey) { |
| LoaderKey other = (LoaderKey) obj; |
| if (parent != other.parent) { |
| return false; |
| } |
| if (urls == other.urls) { |
| return true; |
| } |
| if (urls.length != other.urls.length) { |
| return false; |
| } |
| for (int i = 0; i < urls.length; i++) { |
| if (!urls[i].equals(other.urls[i])) { |
| return false; |
| } |
| } |
| return true; |
| } else { |
| return false; |
| } |
| } |
| } |
| |
| /** |
| * LoaderEntry contains a weak reference to an RMIClassLoader. The |
| * weak reference is registered with the private static "refQueue" |
| * queue. The entry contains the codebase URL path and parent class |
| * loader key for the loader so that the mapping can be removed from |
| * the table efficiently when the weak reference is cleared. |
| */ |
| private static class LoaderEntry extends WeakReference<Loader> { |
| |
| public LoaderKey key; |
| |
| /** |
| * set to true if the entry has been removed from the table |
| * because it has been replaced, so it should not be attempted |
| * to be removed again |
| */ |
| public boolean removed = false; |
| |
| public LoaderEntry(LoaderKey key, Loader loader) { |
| super(loader, refQueue); |
| this.key = key; |
| } |
| } |
| |
| /** |
| * Return the access control context that a loader for the given |
| * codebase URL path should execute with. |
| */ |
| private static AccessControlContext getLoaderAccessControlContext( |
| URL[] urls) |
| { |
| /* |
| * The approach used here is taken from the similar method |
| * getAccessControlContext() in the sun.applet.AppletPanel class. |
| */ |
| // begin with permissions granted to all code in current policy |
| PermissionCollection perms = |
| java.security.AccessController.doPrivileged( |
| new java.security.PrivilegedAction<PermissionCollection>() { |
| public PermissionCollection run() { |
| CodeSource codesource = new CodeSource(null, |
| (java.security.cert.Certificate[]) null); |
| Policy p = java.security.Policy.getPolicy(); |
| if (p != null) { |
| return p.getPermissions(codesource); |
| } else { |
| return new Permissions(); |
| } |
| } |
| }); |
| |
| // createClassLoader permission needed to create loader in context |
| perms.add(new RuntimePermission("createClassLoader")); |
| |
| // add permissions to read any "java.*" property |
| perms.add(new java.util.PropertyPermission("java.*","read")); |
| |
| // add permissions reuiqred to load from codebase URL path |
| addPermissionsForURLs(urls, perms, true); |
| |
| /* |
| * Create an AccessControlContext that consists of a single |
| * protection domain with only the permissions calculated above. |
| */ |
| ProtectionDomain pd = new ProtectionDomain( |
| new CodeSource((urls.length > 0 ? urls[0] : null), |
| (java.security.cert.Certificate[]) null), |
| perms); |
| return new AccessControlContext(new ProtectionDomain[] { pd }); |
| } |
| |
| /** |
| * Adds to the specified permission collection the permissions |
| * necessary to load classes from a loader with the specified URL |
| * path; if "forLoader" is true, also adds URL-specific |
| * permissions necessary for the security context that such a |
| * loader operates within, such as permissions necessary for |
| * granting automatic permissions to classes defined by the |
| * loader. A given permission is only added to the collection if |
| * it is not already implied by the collection. |
| */ |
| public static void addPermissionsForURLs(URL[] urls, |
| PermissionCollection perms, |
| boolean forLoader) |
| { |
| for (int i = 0; i < urls.length; i++) { |
| URL url = urls[i]; |
| try { |
| URLConnection urlConnection = url.openConnection(); |
| Permission p = urlConnection.getPermission(); |
| if (p != null) { |
| if (p instanceof FilePermission) { |
| /* |
| * If the codebase is a file, the permission required |
| * to actually read classes from the codebase URL is |
| * the permission to read all files beneath the last |
| * directory in the file path, either because JAR |
| * files can refer to other JAR files in the same |
| * directory, or because permission to read a |
| * directory is not implied by permission to read the |
| * contents of a directory, which all that might be |
| * granted. |
| */ |
| String path = p.getName(); |
| int endIndex = path.lastIndexOf(File.separatorChar); |
| if (endIndex != -1) { |
| path = path.substring(0, endIndex+1); |
| if (path.endsWith(File.separator)) { |
| path += "-"; |
| } |
| Permission p2 = new FilePermission(path, "read"); |
| if (!perms.implies(p2)) { |
| perms.add(p2); |
| } |
| perms.add(new FilePermission(path, "read")); |
| } else { |
| /* |
| * No directory separator: use permission to |
| * read the file. |
| */ |
| if (!perms.implies(p)) { |
| perms.add(p); |
| } |
| } |
| } else { |
| if (!perms.implies(p)) { |
| perms.add(p); |
| } |
| |
| /* |
| * If the purpose of these permissions is to grant |
| * them to an instance of a URLClassLoader subclass, |
| * we must add permission to connect to and accept |
| * from the host of non-"file:" URLs, otherwise the |
| * getPermissions() method of URLClassLoader will |
| * throw a security exception. |
| */ |
| if (forLoader) { |
| // get URL with meaningful host component |
| URL hostURL = url; |
| for (URLConnection conn = urlConnection; |
| conn instanceof JarURLConnection;) |
| { |
| hostURL = |
| ((JarURLConnection) conn).getJarFileURL(); |
| conn = hostURL.openConnection(); |
| } |
| String host = hostURL.getHost(); |
| if (host != null && |
| p.implies(new SocketPermission(host, |
| "resolve"))) |
| { |
| Permission p2 = |
| new SocketPermission(host, |
| "connect,accept"); |
| if (!perms.implies(p2)) { |
| perms.add(p2); |
| } |
| } |
| } |
| } |
| } |
| } catch (IOException e) { |
| /* |
| * This shouldn't happen, although it is declared to be |
| * thrown by openConnection() and getPermission(). If it |
| * does, don't bother granting or requiring any permissions |
| * for this URL. |
| */ |
| } |
| } |
| } |
| |
| /** |
| * Loader is the actual class of the RMI class loaders created |
| * by the RMIClassLoader static methods. |
| */ |
| private static class Loader extends URLClassLoader { |
| |
| /** parent class loader, kept here as an optimization */ |
| private ClassLoader parent; |
| |
| /** string form of loader's codebase URL path, also an optimization */ |
| private String annotation; |
| |
| /** permissions required to access loader through public API */ |
| private Permissions permissions; |
| |
| private Loader(URL[] urls, ClassLoader parent) { |
| super(urls, parent); |
| this.parent = parent; |
| |
| /* |
| * Precompute the permissions required to access the loader. |
| */ |
| permissions = new Permissions(); |
| addPermissionsForURLs(urls, permissions, false); |
| |
| /* |
| * Caching the value of class annotation string here assumes |
| * that the protected method addURL() is never called on this |
| * class loader. |
| */ |
| annotation = urlsToPath(urls); |
| } |
| |
| /** |
| * Return the string to be annotated with all classes loaded from |
| * this class loader. |
| */ |
| public String getClassAnnotation() { |
| return annotation; |
| } |
| |
| /** |
| * Check that the current access control context has all of the |
| * permissions necessary to load classes from this loader. |
| */ |
| private void checkPermissions() { |
| SecurityManager sm = System.getSecurityManager(); |
| if (sm != null) { // should never be null? |
| Enumeration<Permission> enum_ = permissions.elements(); |
| while (enum_.hasMoreElements()) { |
| sm.checkPermission(enum_.nextElement()); |
| } |
| } |
| } |
| |
| /** |
| * Return the permissions to be granted to code loaded from the |
| * given code source. |
| */ |
| protected PermissionCollection getPermissions(CodeSource codesource) { |
| PermissionCollection perms = super.getPermissions(codesource); |
| /* |
| * Grant the same permissions that URLClassLoader would grant. |
| */ |
| return perms; |
| } |
| |
| /** |
| * Return a string representation of this loader (useful for |
| * debugging). |
| */ |
| public String toString() { |
| return super.toString() + "[\"" + annotation + "\"]"; |
| } |
| |
| @Override |
| protected Class<?> loadClass(String name, boolean resolve) |
| throws ClassNotFoundException { |
| if (parent == null) { |
| ReflectUtil.checkPackageAccess(name); |
| } |
| return super.loadClass(name, resolve); |
| } |
| |
| } |
| |
| private static Class<?> loadClassForName(String name, |
| boolean initialize, |
| ClassLoader loader) |
| throws ClassNotFoundException |
| { |
| if (loader == null) { |
| ReflectUtil.checkPackageAccess(name); |
| } |
| return Class.forName(name, initialize, loader); |
| } |
| |
| } |