Exported resources
Bryan Atsatt
bryan.atsatt at ORACLE.COM
Thu May 31 10:17:09 PDT 2007
I don't think I'm missing anything, just looking at it from perhaps a
different perspective :^)
First, 294 will determine accessibility for non-exported classes. The
assumption at the moment is that they will not be accessible to *any*
class outside of the module.
I do understand the value of a "friend" semantic; it would certainly be
nice to grant certain frameworks special access. But, so far, that is
not on the table for classes.
And if we don't have it for classes, I can't see why we should have it
for resources.
// Bryan
Glyn Normington wrote:
>
> Some feedback from an observer which may help:
>
> > Bryan misses the need for extender model to load internal impl
> classes ala
> > Bundle.loadClass in OSGi.
> >
> > You do not want to have to export the service impl class from a module.
> > You want to hide the class from others' casual loading. However an
> > extender bundle (e.g. ServiceLoader) will need to be able to load that
> > class to make it instances of it available to others under the service
> > interface class.
>
> Glyn
>
> *Bryan Atsatt <bryan.atsatt at ORACLE.COM>* wrote on 30/05/2007 21:21:36:
>
> > I've been assuming that Module private resources should not be visible
> > to *any* class outside of the module. Including ResourceBundle, or any
> > other existing framework classes that do resource lookups (e.g.
> > ServiceLoader, JSF, etc). If resources need to be visible to these
> > existing classes, they must be exported. The very simple check I
> > proposed (immediate caller) is sufficient to make this assertion.
> >
> > I believe your point is that if we used the permission model instead, it
> > would become possible for a module to invoke an external class (e.g.
> > ResourceBundle.getBundle()) and enable *it* to successfully load a
> > private resource from the module.
> >
> > Aside from the permission *grant* mechanism this model would rely on, it
> > is an entirely different model than that used for classes! (Though we
> > haven't explicitly defined this in 294, it seems extremely unlikely that
> > we will rely on permissions--none of the other access modes do so.) Such
> > asymmetry is very disconcerting to me, and, I believe, just plain
> wrong...
> >
> > Consider that you could grant the ServiceLoader, for example, access to
> > a resource that names a class that it could not instantiate. That class
> > would have to be exported. I believe the resource should be as well.
> >
> > // Bryan
> >
> >
> >
> >
> > Stanley M. Ho wrote:
> > > Hi Bryan,
> > >
> > > Those resource-related methods in ClassLoader can be called by anyone,
> > > including code that is part of the module, code that is from other
> > > modules, or code that is part of the platform libraries (e.g.
> > > ResourceBundle). The approach you described would require walking the
> > > stack to get the caller's Module, but the real issue is that it is
> > > difficult to determine who the actual caller is from the stack.
> > >
> > > Treating the immediate caller on the stack as the actual caller
> wouldn't
> > > be sufficient because the immediate caller could be called by someone
> > > else who is the one actually making the call. On the other hand,
> > > treating the originated caller on the stack as the actual caller would
> > > be the right semantic, but this is basically the same as the security
> > > permission approach.
> > >
> > > - Stanley
> > >
> > >
> > > Bryan Atsatt wrote:
> > >> Both solutions require stack walking (unless there is some new
> > >> implementation of the java security model I've not yet seen!).
> > >>
> > >> The permission check does much more work than is necessary here.
> Take a
> > >> look at AccessController.checkPermission() to see what I mean.
> > >>
> > >> And actually there is a very simple API to get the stack, which I've
> > >> used for years:
> > >>
> > >> private static class StackAccessor extends SecurityManager {
> > >> public Class[] getStack() {
> > >> return getClassContext();
> > >> }
> > >> }
> > >>
> > >> private static final STACK_ACCESSOR = new StackAccessor();
> > >>
> > >> Now the enclosing class can simply call STACK_ACCESSOR.getStack().
> > >>
> > >> // Bryan
> > >>
> > >>
> > >>
> > >> Stanley M. Ho wrote:
> > >>> Hi Bryan,
> > >>>
> > >>> Bryan Atsatt wrote:
> > >>>> 1. Definitely agree that resource search order should be
> identical to
> > >>>> class search order.
> > >>>
> > >>> Glad to hear!
> > >>>
> > >>>> 2. Using permissions to limit access to private resources seems like
> > >>>> overkill to me. The prototype implemented this in a very simple
> > >>>> fashion:
> > >>>>
> > >>>> a. If resource is exported, return it, else
> > >>>> a. Get the caller's Module (get class from stack, get module
> from it)
> > >>>> b. If callerModule == this, return resource, else return null.
> > >>>
> > >>> The issue is that this approach still requires stack walking and
> there
> > >>> is no public API in the SE platform that let you implement this.
> > >>>
> > >>> If stack walking is required for the check anyway, I think the
> security
> > >>> permission approach is better that it is implementable with the
> existing
> > >>> API in the SE platform.
> > >>>
> > >>> - Stanley
> > >>>
> > >
>
>
>
> ------------------------------------------------------------------------
>
> /
> /
>
> /Unless stated otherwise above:
> IBM United Kingdom Limited - Registered in England and Wales with number
> 741598.
> Registered office: PO Box 41, North Harbour, Portsmouth, Hampshire PO6 3AU/
>
>
>
>
>
>
More information about the jsr277-eg-observer
mailing list