2007-12-01 00:00:00 +00:00
|
|
|
/*
|
2020-11-07 12:11:43 +00:00
|
|
|
* Copyright (c) 1996, 2020, Oracle and/or its affiliates. All rights reserved.
|
2007-12-01 00:00:00 +00:00
|
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
|
|
*
|
|
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of the GNU General Public License version 2 only, as
|
2010-05-25 15:58:33 -07:00
|
|
|
* published by the Free Software Foundation. Oracle designates this
|
2007-12-01 00:00:00 +00:00
|
|
|
* particular file as subject to the "Classpath" exception as provided
|
2010-05-25 15:58:33 -07:00
|
|
|
* by Oracle in the LICENSE file that accompanied this code.
|
2007-12-01 00:00:00 +00:00
|
|
|
*
|
|
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
|
|
* accompanied this code).
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License version
|
|
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
|
|
*
|
2010-05-25 15:58:33 -07:00
|
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
|
|
* questions.
|
2007-12-01 00:00:00 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
package java.io;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Serializability of a class is enabled by the class implementing the
|
2018-03-28 14:15:41 -04:00
|
|
|
* java.io.Serializable interface.
|
|
|
|
*
|
|
|
|
* <p><strong>Warning: Deserialization of untrusted data is inherently dangerous
|
|
|
|
* and should be avoided. Untrusted data should be carefully validated according to the
|
|
|
|
* "Serialization and Deserialization" section of the
|
|
|
|
* {@extLink secure_coding_guidelines_javase Secure Coding Guidelines for Java SE}.
|
|
|
|
* {@extLink serialization_filter_guide Serialization Filtering} describes best
|
|
|
|
* practices for defensive use of serial filters.
|
|
|
|
* </strong></p>
|
|
|
|
*
|
|
|
|
* Classes that do not implement this
|
2007-12-01 00:00:00 +00:00
|
|
|
* interface will not have any of their state serialized or
|
|
|
|
* deserialized. All subtypes of a serializable class are themselves
|
|
|
|
* serializable. The serialization interface has no methods or fields
|
|
|
|
* and serves only to identify the semantics of being serializable. <p>
|
|
|
|
*
|
2020-11-20 18:26:38 +00:00
|
|
|
* It is possible for subtypes of non-serializable classes to be serialized
|
|
|
|
* and deserialized. During serialization, no data will be written for the
|
|
|
|
* fields of non-serializable superclasses. During deserialization, the fields of non-serializable
|
|
|
|
* superclasses will be initialized using the no-arg constructor of the first (bottommost)
|
|
|
|
* non-serializable superclass. This constructor must be accessible to the subclass that is being
|
|
|
|
* deserialized. It is an error to declare a class Serializable if this is not
|
|
|
|
* the case; the error will be detected at runtime. A serializable subtype may
|
|
|
|
* assume responsibility for saving and restoring the state of a non-serializable
|
|
|
|
* supertype's public, protected, and (if accessible) package-access fields. See
|
|
|
|
* the <a href="{@docRoot}/../specs/serialization/input.html#the-objectinputstream-class">
|
|
|
|
* <cite>Java Object Serialization Specification,</cite></a> section 3.1, for
|
|
|
|
* a detailed specification of the deserialization process, including handling of
|
|
|
|
* serializable and non-serializable classes. <p>
|
2007-12-01 00:00:00 +00:00
|
|
|
*
|
|
|
|
* When traversing a graph, an object may be encountered that does not
|
|
|
|
* support the Serializable interface. In this case the
|
|
|
|
* NotSerializableException will be thrown and will identify the class
|
|
|
|
* of the non-serializable object. <p>
|
|
|
|
*
|
|
|
|
* Classes that require special handling during the serialization and
|
|
|
|
* deserialization process must implement special methods with these exact
|
2013-10-22 17:02:08 -04:00
|
|
|
* signatures:
|
2007-12-01 00:00:00 +00:00
|
|
|
*
|
|
|
|
* <PRE>
|
|
|
|
* private void writeObject(java.io.ObjectOutputStream out)
|
|
|
|
* throws IOException
|
|
|
|
* private void readObject(java.io.ObjectInputStream in)
|
|
|
|
* throws IOException, ClassNotFoundException;
|
|
|
|
* private void readObjectNoData()
|
|
|
|
* throws ObjectStreamException;
|
|
|
|
* </PRE>
|
|
|
|
*
|
|
|
|
* <p>The writeObject method is responsible for writing the state of the
|
|
|
|
* object for its particular class so that the corresponding
|
|
|
|
* readObject method can restore it. The default mechanism for saving
|
|
|
|
* the Object's fields can be invoked by calling
|
|
|
|
* out.defaultWriteObject. The method does not need to concern
|
|
|
|
* itself with the state belonging to its superclasses or subclasses.
|
|
|
|
* State is saved by writing the individual fields to the
|
|
|
|
* ObjectOutputStream using the writeObject method or by using the
|
|
|
|
* methods for primitive data types supported by DataOutput.
|
|
|
|
*
|
|
|
|
* <p>The readObject method is responsible for reading from the stream and
|
|
|
|
* restoring the classes fields. It may call in.defaultReadObject to invoke
|
|
|
|
* the default mechanism for restoring the object's non-static and
|
|
|
|
* non-transient fields. The defaultReadObject method uses information in
|
|
|
|
* the stream to assign the fields of the object saved in the stream with the
|
|
|
|
* correspondingly named fields in the current object. This handles the case
|
|
|
|
* when the class has evolved to add new fields. The method does not need to
|
|
|
|
* concern itself with the state belonging to its superclasses or subclasses.
|
2017-05-24 19:02:45 -07:00
|
|
|
* State is restored by reading data from the ObjectInputStream for
|
|
|
|
* the individual fields and making assignments to the appropriate fields
|
|
|
|
* of the object. Reading primitive data types is supported by DataInput.
|
2007-12-01 00:00:00 +00:00
|
|
|
*
|
|
|
|
* <p>The readObjectNoData method is responsible for initializing the state of
|
|
|
|
* the object for its particular class in the event that the serialization
|
|
|
|
* stream does not list the given class as a superclass of the object being
|
|
|
|
* deserialized. This may occur in cases where the receiving party uses a
|
|
|
|
* different version of the deserialized instance's class than the sending
|
|
|
|
* party, and the receiver's version extends classes that are not extended by
|
|
|
|
* the sender's version. This may also occur if the serialization stream has
|
|
|
|
* been tampered; hence, readObjectNoData is useful for initializing
|
|
|
|
* deserialized objects properly despite a "hostile" or incomplete source
|
|
|
|
* stream.
|
|
|
|
*
|
|
|
|
* <p>Serializable classes that need to designate an alternative object to be
|
|
|
|
* used when writing an object to the stream should implement this
|
2013-10-22 17:02:08 -04:00
|
|
|
* special method with the exact signature:
|
2007-12-01 00:00:00 +00:00
|
|
|
*
|
|
|
|
* <PRE>
|
|
|
|
* ANY-ACCESS-MODIFIER Object writeReplace() throws ObjectStreamException;
|
|
|
|
* </PRE><p>
|
|
|
|
*
|
|
|
|
* This writeReplace method is invoked by serialization if the method
|
|
|
|
* exists and it would be accessible from a method defined within the
|
|
|
|
* class of the object being serialized. Thus, the method can have private,
|
|
|
|
* protected and package-private access. Subclass access to this method
|
|
|
|
* follows java accessibility rules. <p>
|
|
|
|
*
|
|
|
|
* Classes that need to designate a replacement when an instance of it
|
|
|
|
* is read from the stream should implement this special method with the
|
2013-10-22 17:02:08 -04:00
|
|
|
* exact signature.
|
2007-12-01 00:00:00 +00:00
|
|
|
*
|
|
|
|
* <PRE>
|
|
|
|
* ANY-ACCESS-MODIFIER Object readResolve() throws ObjectStreamException;
|
|
|
|
* </PRE><p>
|
|
|
|
*
|
|
|
|
* This readResolve method follows the same invocation rules and
|
|
|
|
* accessibility rules as writeReplace.<p>
|
|
|
|
*
|
2019-11-19 16:26:58 -08:00
|
|
|
* Enum types are all serializable and receive treatment defined by
|
2020-11-20 18:26:38 +00:00
|
|
|
* the <a href="{@docRoot}/../specs/serialization/index.html"><cite>
|
|
|
|
* Java Object Serialization Specification</cite></a> during
|
2019-11-19 16:26:58 -08:00
|
|
|
* serialization and deserialization. Any declarations of the special
|
|
|
|
* handling methods discussed above are ignored for enum types.<p>
|
|
|
|
*
|
2020-12-07 09:30:52 +00:00
|
|
|
* Record classes can implement {@code Serializable} and receive treatment defined
|
|
|
|
* by the <a href="{@docRoot}/../specs/serialization/serial-arch.html#serialization-of-records">
|
|
|
|
* <cite>Java Object Serialization Specification,</cite> Section 1.13,
|
|
|
|
* "Serialization of Records"</a>. Any declarations of the special
|
|
|
|
* handling methods discussed above are ignored for record types.<p>
|
|
|
|
*
|
2007-12-01 00:00:00 +00:00
|
|
|
* The serialization runtime associates with each serializable class a version
|
|
|
|
* number, called a serialVersionUID, which is used during deserialization to
|
|
|
|
* verify that the sender and receiver of a serialized object have loaded
|
|
|
|
* classes for that object that are compatible with respect to serialization.
|
|
|
|
* If the receiver has loaded a class for the object that has a different
|
|
|
|
* serialVersionUID than that of the corresponding sender's class, then
|
|
|
|
* deserialization will result in an {@link InvalidClassException}. A
|
|
|
|
* serializable class can declare its own serialVersionUID explicitly by
|
2019-09-24 09:43:43 +01:00
|
|
|
* declaring a field named {@code "serialVersionUID"} that must be static,
|
|
|
|
* final, and of type {@code long}:
|
2007-12-01 00:00:00 +00:00
|
|
|
*
|
|
|
|
* <PRE>
|
|
|
|
* ANY-ACCESS-MODIFIER static final long serialVersionUID = 42L;
|
|
|
|
* </PRE>
|
|
|
|
*
|
|
|
|
* If a serializable class does not explicitly declare a serialVersionUID, then
|
|
|
|
* the serialization runtime will calculate a default serialVersionUID value
|
|
|
|
* for that class based on various aspects of the class, as described in the
|
2020-11-20 18:26:38 +00:00
|
|
|
* <a href="{@docRoot}/../specs/serialization/index.html"><cite>Java Object Serialization
|
|
|
|
* Specification.</cite></a> This specification defines the
|
2019-11-19 16:26:58 -08:00
|
|
|
* serialVersionUID of an enum type to be 0L. However, it is <em>strongly
|
|
|
|
* recommended</em> that all serializable classes other than enum types explicitly declare
|
2007-12-01 00:00:00 +00:00
|
|
|
* serialVersionUID values, since the default serialVersionUID computation is
|
|
|
|
* highly sensitive to class details that may vary depending on compiler
|
|
|
|
* implementations, and can thus result in unexpected
|
2019-09-24 09:43:43 +01:00
|
|
|
* {@code InvalidClassException}s during deserialization. Therefore, to
|
2007-12-01 00:00:00 +00:00
|
|
|
* guarantee a consistent serialVersionUID value across different java compiler
|
|
|
|
* implementations, a serializable class must declare an explicit
|
|
|
|
* serialVersionUID value. It is also strongly advised that explicit
|
2019-09-24 09:43:43 +01:00
|
|
|
* serialVersionUID declarations use the {@code private} modifier where
|
2007-12-01 00:00:00 +00:00
|
|
|
* possible, since such declarations apply only to the immediately declaring
|
|
|
|
* class--serialVersionUID fields are not useful as inherited members. Array
|
|
|
|
* classes cannot declare an explicit serialVersionUID, so they always have
|
|
|
|
* the default computed value, but the requirement for matching
|
|
|
|
* serialVersionUID values is waived for array classes.
|
|
|
|
*
|
|
|
|
* @see java.io.ObjectOutputStream
|
|
|
|
* @see java.io.ObjectInputStream
|
|
|
|
* @see java.io.ObjectOutput
|
|
|
|
* @see java.io.ObjectInput
|
|
|
|
* @see java.io.Externalizable
|
2020-11-20 18:26:38 +00:00
|
|
|
* @see <a href="{@docRoot}/../specs/serialization/index.html">
|
|
|
|
* <cite>Java Object Serialization Specification</cite></a>
|
2014-06-10 16:18:54 -07:00
|
|
|
* @since 1.1
|
2007-12-01 00:00:00 +00:00
|
|
|
*/
|
|
|
|
public interface Serializable {
|
|
|
|
}
|