提交 8bbc2c00 编写于 作者: T tbell

Merge

...@@ -102,6 +102,8 @@ javac.includes = \ ...@@ -102,6 +102,8 @@ javac.includes = \
javac.tests = \ javac.tests = \
tools/javac tools/javac
#
javadoc.includes = \ javadoc.includes = \
com/sun/javadoc/ \ com/sun/javadoc/ \
com/sun/tools/javadoc/ com/sun/tools/javadoc/
...@@ -109,18 +111,24 @@ javadoc.includes = \ ...@@ -109,18 +111,24 @@ javadoc.includes = \
javadoc.tests = \ javadoc.tests = \
tools/javadoc/ tools/javadoc/
#
doclets.includes = \ doclets.includes = \
com/sun/tools/doclets/ com/sun/tools/doclets/
doclets.tests = \ doclets.tests = \
com/sun/javadoc/ com/sun/javadoc/
#
javah.includes = \ javah.includes = \
com/sun/tools/javah/ com/sun/tools/javah/
javah.tests = \ javah.tests = \
tools/javah/ tools/javah/
#
javap.includes = \ javap.includes = \
com/sun/tools/classfile/ \ com/sun/tools/classfile/ \
com/sun/tools/javap/ \ com/sun/tools/javap/ \
...@@ -129,6 +137,8 @@ javap.includes = \ ...@@ -129,6 +137,8 @@ javap.includes = \
javap.tests = \ javap.tests = \
tools/javap/ tools/javap/
#
apt.includes = \ apt.includes = \
com/sun/mirror/ \ com/sun/mirror/ \
com/sun/tools/apt/ com/sun/tools/apt/
...@@ -136,4 +146,9 @@ apt.includes = \ ...@@ -136,4 +146,9 @@ apt.includes = \
apt.tests = \ apt.tests = \
tools/apt/ tools/apt/
#
# The following value is used by the main jtreg target.
# An empty value means all tests
# Override as desired to run a specific set of tests
jtreg.tests =
...@@ -84,6 +84,16 @@ ...@@ -84,6 +84,16 @@
<!-- Standard property values, if not overriden by earlier settings. --> <!-- Standard property values, if not overriden by earlier settings. -->
<property file="${make.dir}/build.properties"/> <property file="${make.dir}/build.properties"/>
<!-- launcher.java is used in the launcher scripts provided to run
the tools' jar files. If it has not already been set, then
default it to use ${target.java.home}, if available, otherwise
quietly default to simply use "java". -->
<condition property="launcher.java"
value="${target.java.home}/bin/java" else="java">
<isset property="target.java.home"/>
</condition>
<!-- Standard target to build deliverables for JDK build. --> <!-- Standard target to build deliverables for JDK build. -->
<target name="build" depends="build-bootstrap-tools,build-all-classes"> <target name="build" depends="build-bootstrap-tools,build-all-classes">
...@@ -113,11 +123,9 @@ ...@@ -113,11 +123,9 @@
<!-- Additional targets for running tools on the build --> <!-- Additional targets for running tools on the build -->
<!-- An alternative for the following would be to do a single jtreg run for all tests. <target name="jtreg" depends="build-all-tools,-def-jtreg">
However, that would currently be slower, since we would have to run all the tests <jtreg-tool name="all" tests="${jtreg.tests}"/>
with samevm="false", since not all test directories currently support samevm="true". --> </target>
<target name="jtreg" depends="jtreg-javac,jtreg-javadoc,jtreg-doclets,jtreg-javah,jtreg-javap,jtreg-apt"/>
<target name="findbugs" depends="-def-findbugs,build-all-tools"> <target name="findbugs" depends="-def-findbugs,build-all-tools">
<property name="findbugs.reportLevel" value="medium"/> <property name="findbugs.reportLevel" value="medium"/>
...@@ -197,7 +205,7 @@ ...@@ -197,7 +205,7 @@
</target> </target>
<target name="jtreg-javac" depends="build-javac,-def-jtreg"> <target name="jtreg-javac" depends="build-javac,-def-jtreg">
<jtreg-tool name="javac" samevm="true" tests="${javac.tests}"/> <jtreg-tool name="javac" tests="${javac.tests}"/>
</target> </target>
<target name="findbugs-javac" depends="build-javac,-def-findbugs"> <target name="findbugs-javac" depends="build-javac,-def-findbugs">
...@@ -229,7 +237,7 @@ ...@@ -229,7 +237,7 @@
</target> </target>
<target name="jtreg-javadoc" depends="build-javadoc,-def-jtreg"> <target name="jtreg-javadoc" depends="build-javadoc,-def-jtreg">
<jtreg-tool name="javadoc" samevm="false" tests="${javadoc.tests}"/> <jtreg-tool name="javadoc" tests="${javadoc.tests}"/>
</target> </target>
<target name="findbugs-javadoc" depends="build-javadoc,-def-findbugs"> <target name="findbugs-javadoc" depends="build-javadoc,-def-findbugs">
...@@ -261,7 +269,7 @@ ...@@ -261,7 +269,7 @@
<!-- (no javadoc for doclets) --> <!-- (no javadoc for doclets) -->
<target name="jtreg-doclets" depends="build-doclets,-def-jtreg"> <target name="jtreg-doclets" depends="build-doclets,-def-jtreg">
<jtreg-tool name="doclets" samevm="false" tests="${doclets.tests}"/> <jtreg-tool name="doclets" tests="${doclets.tests}"/>
</target> </target>
<target name="findbugs-doclets" depends="build-doclets,-def-findbugs"> <target name="findbugs-doclets" depends="build-doclets,-def-findbugs">
...@@ -291,7 +299,7 @@ ...@@ -291,7 +299,7 @@
<!-- (no javadoc for javah) --> <!-- (no javadoc for javah) -->
<target name="jtreg-javah" depends="build-javah,-def-jtreg"> <target name="jtreg-javah" depends="build-javah,-def-jtreg">
<jtreg-tool name="javah" samevm="true" tests="${javah.tests}"/> <jtreg-tool name="javah" tests="${javah.tests}"/>
</target> </target>
<target name="findbugs-javah" depends="build-javah,-def-findbugs"> <target name="findbugs-javah" depends="build-javah,-def-findbugs">
...@@ -322,7 +330,7 @@ ...@@ -322,7 +330,7 @@
<!-- (no javadoc for javap) --> <!-- (no javadoc for javap) -->
<target name="jtreg-javap" depends="build-javap,-def-jtreg"> <target name="jtreg-javap" depends="build-javap,-def-jtreg">
<jtreg-tool name="javap" samevm="true" tests="${javap.tests}"/> <jtreg-tool name="javap" tests="${javap.tests}"/>
</target> </target>
<target name="findbugs-javap" depends="build-javap,-def-findbugs"> <target name="findbugs-javap" depends="build-javap,-def-findbugs">
...@@ -355,7 +363,7 @@ ...@@ -355,7 +363,7 @@
<target name="jtreg-apt" depends="build-apt,-def-jtreg"> <target name="jtreg-apt" depends="build-apt,-def-jtreg">
<jtreg-tool name="apt" samevm="true" tests="${apt.tests}"/> <jtreg-tool name="apt" tests="${apt.tests}"/>
</target> </target>
<target name="findbugs-apt" depends="build-apt,-def-findbugs"> <target name="findbugs-apt" depends="build-apt,-def-findbugs">
...@@ -397,7 +405,7 @@ ...@@ -397,7 +405,7 @@
<attribute name="classes.dir" default="${build.classes.dir}"/> <attribute name="classes.dir" default="${build.classes.dir}"/>
<attribute name="gensrc.dir" default="${build.gensrc.dir}"/> <attribute name="gensrc.dir" default="${build.gensrc.dir}"/>
<attribute name="lib.dir" default="${dist.lib.dir}"/> <attribute name="lib.dir" default="${dist.lib.dir}"/>
<attribute name="java" default="java"/> <attribute name="java" default="${launcher.java}"/>
<attribute name="javac.bootclasspath" default="${build.bootstrap.dir}/classes"/> <attribute name="javac.bootclasspath" default="${build.bootstrap.dir}/classes"/>
<attribute name="javac.java.home" default="${boot.java.home}"/> <attribute name="javac.java.home" default="${boot.java.home}"/>
<attribute name="javac.source" default="${javac.source}"/> <attribute name="javac.source" default="${javac.source}"/>
...@@ -641,7 +649,7 @@ ...@@ -641,7 +649,7 @@
</macrodef> </macrodef>
</target> </target>
<target name="-def-jtreg" unless="jtreg.defined" depends="-check-jtreg.home"> <target name="-def-jtreg" unless="jtreg.defined" depends="-check-jtreg.home,-check-target.java.home">
<taskdef name="jtreg" classname="com.sun.javatest.regtest.Main$$Ant"> <taskdef name="jtreg" classname="com.sun.javatest.regtest.Main$$Ant">
<classpath> <classpath>
<pathelement location="${jtreg.home}/lib/jtreg.jar"/> <pathelement location="${jtreg.home}/lib/jtreg.jar"/>
...@@ -652,7 +660,7 @@ ...@@ -652,7 +660,7 @@
<attribute name="name"/> <attribute name="name"/>
<attribute name="tests"/> <attribute name="tests"/>
<attribute name="jdk" default="${target.java.home}"/> <attribute name="jdk" default="${target.java.home}"/>
<attribute name="samevm" default="false"/> <attribute name="samevm" default="true"/>
<attribute name="verbose" default="summary"/> <attribute name="verbose" default="summary"/>
<attribute name="options" default=""/> <attribute name="options" default=""/>
<attribute name="keywords" default="-keywords:!ignore"/> <attribute name="keywords" default="-keywords:!ignore"/>
......
...@@ -45,7 +45,7 @@ if [ "$LANGTOOLS_USE_BOOTCLASSPATH" != "no" ]; then ...@@ -45,7 +45,7 @@ if [ "$LANGTOOLS_USE_BOOTCLASSPATH" != "no" ]; then
fi fi
# tools currently assumes that assertions are enabled in the launcher # tools currently assumes that assertions are enabled in the launcher
ea=-ea:com.sun.tools ea=-ea:com.sun.tools...
# Any parameters starting with -J are passed to the JVM. # Any parameters starting with -J are passed to the JVM.
# All other parameters become parameters of #PROGRAM#. # All other parameters become parameters of #PROGRAM#.
......
/*
* Copyright 2007 Sun Microsystems, Inc. All Rights Reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Sun designates this
* particular file as subject to the "Classpath" exception as provided
* by Sun in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
* CA 95054 USA or visit www.sun.com if you need additional information or
* have any questions.
*/
package com.sun.tools.javac.file;
import java.io.Closeable;
import java.io.IOException;
import java.lang.reflect.Field;
import java.net.URL;
import java.net.URLClassLoader;
import java.util.ArrayList;
import java.util.jar.JarFile;
/**
* A URLClassLoader that also implements Closeable.
* Reflection is used to access internal data structures in the URLClassLoader,
* since no public API exists for this purpose. Therefore this code is somewhat
* fragile. Caveat emptor.
* @throws Error if the internal data structures are not as expected.
*
* <p><b>This is NOT part of any API supported by Sun Microsystems. If
* you write code that depends on this, you do so at your own risk.
* This code and its internal interfaces are subject to change or
* deletion without notice.</b>
*/
class CloseableURLClassLoader
extends URLClassLoader implements Closeable {
CloseableURLClassLoader(URL[] urls, ClassLoader parent) throws Error {
super(urls, parent);
try {
getLoaders(); //proactive check that URLClassLoader is as expected
} catch (Throwable t) {
throw new Error("cannot create CloseableURLClassLoader", t);
}
}
/**
* Close any jar files that may have been opened by the class loader.
* Reflection is used to access the jar files in the URLClassLoader's
* internal data structures.
* @throws java.io.IOException if the jar files cannot be found for any
* reson, or if closing the jar file itself causes an IOException.
*/
public void close() throws IOException {
try {
for (Object l: getLoaders()) {
if (l.getClass().getName().equals("sun.misc.URLClassPath$JarLoader")) {
Field jarField = l.getClass().getDeclaredField("jar");
JarFile jar = (JarFile) getField(l, jarField);
//System.err.println("CloseableURLClassLoader: closing " + jar);
jar.close();
}
}
} catch (Throwable t) {
IOException e = new IOException("cannot close class loader");
e.initCause(t);
throw e;
}
}
private ArrayList<?> getLoaders()
throws NoSuchFieldException, IllegalArgumentException, IllegalAccessException
{
Field ucpField = URLClassLoader.class.getDeclaredField("ucp");
Object urlClassPath = getField(this, ucpField);
if (urlClassPath == null)
throw new AssertionError("urlClassPath not set in URLClassLoader");
Field loadersField = urlClassPath.getClass().getDeclaredField("loaders");
return (ArrayList<?>) getField(urlClassPath, loadersField);
}
private Object getField(Object o, Field f)
throws IllegalArgumentException, IllegalAccessException {
boolean prev = f.isAccessible();
try {
f.setAccessible(true);
return f.get(o);
} finally {
f.setAccessible(prev);
}
}
}
...@@ -33,6 +33,7 @@ import java.io.IOException; ...@@ -33,6 +33,7 @@ import java.io.IOException;
import java.io.InputStream; import java.io.InputStream;
import java.io.OutputStreamWriter; import java.io.OutputStreamWriter;
import java.lang.ref.SoftReference; import java.lang.ref.SoftReference;
import java.lang.reflect.Constructor;
import java.net.MalformedURLException; import java.net.MalformedURLException;
import java.net.URI; import java.net.URI;
import java.net.URL; import java.net.URL;
...@@ -76,6 +77,7 @@ import com.sun.tools.javac.util.ListBuffer; ...@@ -76,6 +77,7 @@ import com.sun.tools.javac.util.ListBuffer;
import com.sun.tools.javac.util.Log; import com.sun.tools.javac.util.Log;
import com.sun.tools.javac.util.Options; import com.sun.tools.javac.util.Options;
import java.io.Closeable;
import static javax.tools.StandardLocation.*; import static javax.tools.StandardLocation.*;
import static com.sun.tools.javac.main.OptionName.*; import static com.sun.tools.javac.main.OptionName.*;
...@@ -131,6 +133,7 @@ public class JavacFileManager implements StandardJavaFileManager { ...@@ -131,6 +133,7 @@ public class JavacFileManager implements StandardJavaFileManager {
protected boolean mmappedIO; protected boolean mmappedIO;
protected boolean ignoreSymbolFile; protected boolean ignoreSymbolFile;
protected String classLoaderClass;
/** /**
* User provided charset (through javax.tools). * User provided charset (through javax.tools).
...@@ -180,6 +183,7 @@ public class JavacFileManager implements StandardJavaFileManager { ...@@ -180,6 +183,7 @@ public class JavacFileManager implements StandardJavaFileManager {
mmappedIO = options.get("mmappedIO") != null; mmappedIO = options.get("mmappedIO") != null;
ignoreSymbolFile = options.get("ignore.symbol.file") != null; ignoreSymbolFile = options.get("ignore.symbol.file") != null;
classLoaderClass = options.get("procloader");
} }
public JavaFileObject getFileForInput(String name) { public JavaFileObject getFileForInput(String name) {
...@@ -747,8 +751,40 @@ public class JavacFileManager implements StandardJavaFileManager { ...@@ -747,8 +751,40 @@ public class JavacFileManager implements StandardJavaFileManager {
throw new AssertionError(e); throw new AssertionError(e);
} }
} }
return new URLClassLoader(lb.toArray(new URL[lb.size()]),
getClass().getClassLoader()); URL[] urls = lb.toArray(new URL[lb.size()]);
ClassLoader thisClassLoader = getClass().getClassLoader();
// Bug: 6558476
// Ideally, ClassLoader should be Closeable, but before JDK7 it is not.
// On older versions, try the following, to get a closeable classloader.
// 1: Allow client to specify the class to use via hidden option
if (classLoaderClass != null) {
try {
Class<? extends ClassLoader> loader =
Class.forName(classLoaderClass).asSubclass(ClassLoader.class);
Class<?>[] constrArgTypes = { URL[].class, ClassLoader.class };
Constructor<? extends ClassLoader> constr = loader.getConstructor(constrArgTypes);
return constr.newInstance(new Object[] { urls, thisClassLoader });
} catch (Throwable t) {
// ignore errors loading user-provided class loader, fall through
}
}
// 2: If URLClassLoader implements Closeable, use that.
if (Closeable.class.isAssignableFrom(URLClassLoader.class))
return new URLClassLoader(urls, thisClassLoader);
// 3: Try using private reflection-based CloseableURLClassLoader
try {
return new CloseableURLClassLoader(urls, thisClassLoader);
} catch (Throwable t) {
// ignore errors loading workaround class loader, fall through
}
// 4: If all else fails, use plain old standard URLClassLoader
return new URLClassLoader(urls, thisClassLoader);
} }
public Iterable<JavaFileObject> list(Location location, public Iterable<JavaFileObject> list(Location location,
......
...@@ -813,6 +813,9 @@ public class JavaCompiler implements ClassReader.SourceCompleter { ...@@ -813,6 +813,9 @@ public class JavaCompiler implements ClassReader.SourceCompleter {
} catch (Abort ex) { } catch (Abort ex) {
if (devVerbose) if (devVerbose)
ex.printStackTrace(); ex.printStackTrace();
} finally {
if (procEnvImpl != null)
procEnvImpl.close();
} }
} }
...@@ -936,7 +939,7 @@ public class JavaCompiler implements ClassReader.SourceCompleter { ...@@ -936,7 +939,7 @@ public class JavaCompiler implements ClassReader.SourceCompleter {
/** /**
* Object to handle annotation processing. * Object to handle annotation processing.
*/ */
JavacProcessingEnvironment procEnvImpl = null; private JavacProcessingEnvironment procEnvImpl = null;
/** /**
* Check if we should process annotations. * Check if we should process annotations.
...@@ -947,7 +950,8 @@ public class JavaCompiler implements ClassReader.SourceCompleter { ...@@ -947,7 +950,8 @@ public class JavaCompiler implements ClassReader.SourceCompleter {
* @param processors user provided annotation processors to bypass * @param processors user provided annotation processors to bypass
* discovery, {@code null} means that no processors were provided * discovery, {@code null} means that no processors were provided
*/ */
public void initProcessAnnotations(Iterable<? extends Processor> processors) { public void initProcessAnnotations(Iterable<? extends Processor> processors)
throws IOException {
// Process annotations if processing is not disabled and there // Process annotations if processing is not disabled and there
// is at least one Processor available. // is at least one Processor available.
Options options = Options.instance(context); Options options = Options.instance(context);
...@@ -974,7 +978,8 @@ public class JavaCompiler implements ClassReader.SourceCompleter { ...@@ -974,7 +978,8 @@ public class JavaCompiler implements ClassReader.SourceCompleter {
} }
// TODO: called by JavacTaskImpl // TODO: called by JavacTaskImpl
public JavaCompiler processAnnotations(List<JCCompilationUnit> roots) throws IOException { public JavaCompiler processAnnotations(List<JCCompilationUnit> roots)
throws IOException {
return processAnnotations(roots, List.<String>nil()); return processAnnotations(roots, List.<String>nil());
} }
...@@ -1061,10 +1066,14 @@ public class JavaCompiler implements ClassReader.SourceCompleter { ...@@ -1061,10 +1066,14 @@ public class JavaCompiler implements ClassReader.SourceCompleter {
return this; return this;
} }
} }
try {
JavaCompiler c = procEnvImpl.doProcessing(context, roots, classSymbols, pckSymbols); JavaCompiler c = procEnvImpl.doProcessing(context, roots, classSymbols, pckSymbols);
if (c != this) if (c != this)
annotationProcessingOccurred = c.annotationProcessingOccurred = true; annotationProcessingOccurred = c.annotationProcessingOccurred = true;
return c; return c;
} finally {
procEnvImpl.close();
}
} catch (CompletionFailure ex) { } catch (CompletionFailure ex) {
log.error("cant.access", ex.sym, ex.getDetailValue()); log.error("cant.access", ex.sym, ex.getDetailValue());
return this; return this;
......
...@@ -136,6 +136,8 @@ public class JavacProcessingEnvironment implements ProcessingEnvironment, Closea ...@@ -136,6 +136,8 @@ public class JavacProcessingEnvironment implements ProcessingEnvironment, Closea
*/ */
Source source; Source source;
private ClassLoader processorClassLoader;
/** /**
* JavacMessages object used for localization * JavacMessages object used for localization
*/ */
...@@ -203,7 +205,7 @@ public class JavacProcessingEnvironment implements ProcessingEnvironment, Closea ...@@ -203,7 +205,7 @@ public class JavacProcessingEnvironment implements ProcessingEnvironment, Closea
JavaFileManager fileManager = context.get(JavaFileManager.class); JavaFileManager fileManager = context.get(JavaFileManager.class);
try { try {
// If processorpath is not explicitly set, use the classpath. // If processorpath is not explicitly set, use the classpath.
ClassLoader processorCL = fileManager.hasLocation(ANNOTATION_PROCESSOR_PATH) processorClassLoader = fileManager.hasLocation(ANNOTATION_PROCESSOR_PATH)
? fileManager.getClassLoader(ANNOTATION_PROCESSOR_PATH) ? fileManager.getClassLoader(ANNOTATION_PROCESSOR_PATH)
: fileManager.getClassLoader(CLASS_PATH); : fileManager.getClassLoader(CLASS_PATH);
...@@ -213,9 +215,9 @@ public class JavacProcessingEnvironment implements ProcessingEnvironment, Closea ...@@ -213,9 +215,9 @@ public class JavacProcessingEnvironment implements ProcessingEnvironment, Closea
* provider mechanism to create the processor iterator. * provider mechanism to create the processor iterator.
*/ */
if (processorNames != null) { if (processorNames != null) {
processorIterator = new NameProcessIterator(processorNames, processorCL, log); processorIterator = new NameProcessIterator(processorNames, processorClassLoader, log);
} else { } else {
processorIterator = new ServiceIterator(processorCL, log); processorIterator = new ServiceIterator(processorClassLoader, log);
} }
} catch (SecurityException e) { } catch (SecurityException e) {
/* /*
...@@ -1019,9 +1021,11 @@ public class JavacProcessingEnvironment implements ProcessingEnvironment, Closea ...@@ -1019,9 +1021,11 @@ public class JavacProcessingEnvironment implements ProcessingEnvironment, Closea
/** /**
* Free resources related to annotation processing. * Free resources related to annotation processing.
*/ */
public void close() { public void close() throws IOException {
filer.close(); filer.close();
discoveredProcs = null; discoveredProcs = null;
if (processorClassLoader != null && processorClassLoader instanceof Closeable)
((Closeable) processorClassLoader).close();
} }
private List<ClassSymbol> getTopLevelClasses(List<? extends JCCompilationUnit> units) { private List<ClassSymbol> getTopLevelClasses(List<? extends JCCompilationUnit> units) {
......
/*
* Copyright 2008 Sun Microsystems, Inc. All Rights Reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
* CA 95054 USA or visit www.sun.com if you need additional information or
* have any questions.
*/
/*
* @test
* @run main/othervm -Xmx512m -Xms512m T6558476
*/
import java.io.File;
import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.io.IOException;
import java.util.Random;
import com.sun.tools.javac.Main;
public class T6558476 {
private static File copyFileTo(File file, File directory) throws IOException {
File newFile = new File(directory, file.getName());
FileInputStream fis = null;
FileOutputStream fos = null;
try {
fis = new FileInputStream(file);
fos = new FileOutputStream(newFile);
byte buff[] = new byte[1024];
int val;
while ((val = fis.read(buff)) > 0)
fos.write(buff, 0, val);
} finally {
if (fis != null)
fis.close();
if (fos != null)
fos.close();
}
return newFile;
}
private static String generateJavaClass(String className) {
StringBuffer sb = new StringBuffer();
sb.append("import sun.net.spi.nameservice.dns.DNSNameService;\n");
sb.append("public class ");
sb.append(className);
sb.append(" {\n");
sb.append(" public void doStuff() {\n");
sb.append(" DNSNameService dns = null;\n");
sb.append(" }\n");
sb.append("}\n");
return sb.toString();
}
public static void main(String[] args) throws IOException {
File javaHomeDir = new File(System.getProperty("java.home"));
File tmpDir = new File(System.getProperty("java.io.tmpdir"));
File outputDir = new File(tmpDir, "outputDir" + new Random().nextInt(65536));
outputDir.mkdir();
outputDir.deleteOnExit();
File dnsjarfile = new File(javaHomeDir, "lib" + File.separator + "ext" + File.separator + "dnsns.jar");
File tmpJar = copyFileTo(dnsjarfile, outputDir);
String className = "TheJavaFile";
File javaFile = new File(outputDir, className + ".java");
javaFile.deleteOnExit();
FileOutputStream fos = new FileOutputStream(javaFile);
fos.write(generateJavaClass(className).getBytes());
fos.close();
int rc = Main.compile(new String[]{"-d", outputDir.getPath(),
"-classpath",
tmpJar.getPath(),
javaFile.getAbsolutePath()});
if (rc != 0) {
throw new Error("Couldn't compile the file (exit code=" + rc + ")");
}
if (tmpJar.delete()) {
System.out.println("jar file successfully deleted");
} else {
throw new Error("Error deleting file \"" + tmpJar.getPath() + "\"");
}
}
}
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册