All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.jwebmp.guicedinjection.interfaces.IPackageContentsScanner Maven / Gradle / Ivy

Go to download

Guice Injection allows you to access multiple Guice Binders and Modules across separate archives. Allowing you to configure your applications with injection from multiple dependancies. Servlets, EJB's, and Stand-Alone is supported. Requires JDK 8 or 10.

There is a newer version: 0.66.0.1
Show newest version
package com.jwebmp.guicedinjection.interfaces;

import java.util.Set;

/**
 * The constructor accepts a list of whitelisted package prefixes / jar names to scan, as well as blacklisted packages/jars not to scan, where blacklisted entries are prefixed
 * 

* Whitelisting/blacklisting packages (and their subpackages) *

* Providing one or more package names to the constructor limits scanning to the named packages and their subpackages. Packages can be blacklisted by prefixing the name with -. *

* new FastClasspathScanner("com.abc", "com.xyz", "-com.xyz.badpkg") *

* Blacklisted entries override whitelisted entries *

* When whitelisted packages are used together, the result is the union of classes in the whitelisted packages. When combining whitelisted packages with blacklisted packages, the * result is the set difference between whitelisted packages and blacklisted packages. *

* If only one or more blacklisted packages are provided (with no accompanying whitelisted package or class), all packages except for the blacklisted packages will be scanned. *

* new FastClasspathScanner("-com.xyz.badpkg") *

* Limiting scanning to specific jars on the classpath *

* By default, all jarfiles on the classpath are scanned. To limit scanning to one or more specific jars, specify the jar filenames (without path) after a jar: prefix. Jar name * specifications can include a glob (*) character. *

* Note that this is a separate filtering mechanism from the package and class whitelist: whitelists are used to limit scanning within jars and/or directories; adding jar: entries * to the scan spec limits scanning to the named jar(s), rather than scanning all jars. *

* Specifying a jar: entry in the scan spec does not prevent the scanning of directories. Directory scanning can also be disabled by adding "-dir:" (see below). *

* new FastClasspathScanner("com.x", "jar:deploy.jar", "-jar:irrelevant-*.jar") *

* Advanced): When using jar whitelisting with multiply-defined classes *

* Jar whitelisting can be problematic if multiple classes of the same fully-qualified name are defined in different classpath elements. Classes are resolved for loading in * classpath order, so all but the first definition of a class in the classpath will be ignored due to classpath masking. This can lead to classes you expect to match not showing * up as matches, if you only whitelist classpath jars containing the second or subsequent definition of a class. *

* For example, if the classpath consists of a.jar and b.jar, in that order, and both jars contain a class definition pkg/Cls.class, then the class definition in b.jar is ignored, * because it is masked by a definition occurring earlier in the classpath, in a.jar. *

* Even if you restrict scanning by providing "jar:b.jar" in the scan spec, the file pkg/Cls.class in b.jar will be ignored, and will not be provided to a MatchProcessor. The * reason for this is to ensure that MatchProcessors only ever get passed references to classes that would be loaded by the current ClassLoader. This is to prevent inconsistencies, * since otherwise the version of the class that would be loaded would depend upon whether FastClasspathScanner manually loaded a class definition first, or whether the current * ClassLoader loaded a definition for a class of the same name first. *

* In general, if you run into this issue with multiply-defined classes, there are several possible alternatives to jar whitelisting: *

* Ensure that you only ever have one definition on the classpath for all classes you want to match before calling FastClasspathScanner (i.e. start the JRE with a more restricted * classpath). * Override the classpath or provide a custom URLClassLoader before scanning, so that there are no non-scanned classpath elements that can mask elements in the whitelisted * directories/jars that you do want to scan. (However, be aware that the system classloader may still return cached references to already-loaded classfiles outside this overridden * path (or won't call your custom ClassLoader), due to class caching.) */ @FunctionalInterface public interface IPackageContentsScanner { /** * The constructor accepts a list of whitelisted package prefixes / jar names to scan, as well as blacklisted packages/jars not to scan, where blacklisted entries are prefixed *

* Whitelisting/blacklisting packages (and their subpackages) *

* Providing one or more package names to the constructor limits scanning to the named packages and their subpackages. Packages can be blacklisted by prefixing the name with * -. *

* new FastClasspathScanner("com.abc", "com.xyz", "-com.xyz.badpkg") *

* Blacklisted entries override whitelisted entries *

* When whitelisted packages are used together, the result is the union of classes in the whitelisted packages. When combining whitelisted packages with blacklisted packages, * the result is the set difference between whitelisted packages and blacklisted packages. *

* If only one or more blacklisted packages are provided (with no accompanying whitelisted package or class), all packages except for the blacklisted packages will be scanned. *

* new FastClasspathScanner("-com.xyz.badpkg") *

* Limiting scanning to specific jars on the classpath *

* By default, all jarfiles on the classpath are scanned. To limit scanning to one or more specific jars, specify the jar filenames (without path) after a jar: prefix. Jar name * specifications can include a glob (*) character. *

* Note that this is a separate filtering mechanism from the package and class whitelist: whitelists are used to limit scanning within jars and/or directories; adding jar: * entries to the scan spec limits scanning to the named jar(s), rather than scanning all jars. *

* Specifying a jar: entry in the scan spec does not prevent the scanning of directories. Directory scanning can also be disabled by adding "-dir:" (see below). *

* new FastClasspathScanner("com.x", "jar:deploy.jar", "-jar:irrelevant-*.jar") *

* Advanced): When using jar whitelisting with multiply-defined classes *

* Jar whitelisting can be problematic if multiple classes of the same fully-qualified name are defined in different classpath elements. Classes are resolved for loading in * classpath order, so all but the first definition of a class in the classpath will be ignored due to classpath masking. This can lead to classes you expect to match not * showing up as matches, if you only whitelist classpath jars containing the second or subsequent definition of a class. *

* For example, if the classpath consists of a.jar and b.jar, in that order, and both jars contain a class definition pkg/Cls.class, then the class definition in b.jar is * ignored, because it is masked by a definition occurring earlier in the classpath, in a.jar. *

* Even if you restrict scanning by providing "jar:b.jar" in the scan spec, the file pkg/Cls.class in b.jar will be ignored, and will not be provided to a MatchProcessor. The * reason for this is to ensure that MatchProcessors only ever get passed references to classes that would be loaded by the current ClassLoader. This is to prevent * inconsistencies, since otherwise the version of the class that would be loaded would depend upon whether FastClasspathScanner manually loaded a class definition first, or * whether the current ClassLoader loaded a definition for a class of the same name first. *

* In general, if you run into this issue with multiply-defined classes, there are several possible alternatives to jar whitelisting: *

* Ensure that you only ever have one definition on the classpath for all classes you want to match before calling FastClasspathScanner (i.e. start the JRE with a more * restricted classpath). * Override the classpath or provide a custom URLClassLoader before scanning, so that there are no non-scanned classpath elements that can mask elements in the whitelisted * directories/jars that you do want to scan. (However, be aware that the system classloader may still return cached references to already-loaded classfiles outside this * overridden path (or won't call your custom ClassLoader), due to class caching.) * * @return the set of string */ Set searchFor(); }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy