/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.commons.collections.functors;
import java.io.IOException;
import java.io.ObjectInputStream;
import java.io.ObjectOutputStream;
import java.io.Serializable;
import org.apache.commons.collections.Closure;
import org.apache.commons.collections.Predicate;
Closure implementation that executes a closure repeatedly until a condition is met,
like a do-while or while loop.
WARNING: from v3.2.2 onwards this class will throw an UnsupportedOperationException
when trying to serialize or de-serialize an instance to prevent potential remote code execution exploits.
In order to re-enable serialization support for WhileClosure
the following system property can be used (via -Dproperty=true):
org.apache.commons.collections.enableUnsafeSerialization
Author: Stephen Colebourne Since: Commons Collections 3.0 Version: $Revision: 1713845 $ $Date: 2015-11-11 15:02:16 +0100 (Wed, 11 Nov 2015) $
/**
* Closure implementation that executes a closure repeatedly until a condition is met,
* like a do-while or while loop.
* <p>
* <b>WARNING:</b> from v3.2.2 onwards this class will throw an
* {@link UnsupportedOperationException} when trying to serialize or
* de-serialize an instance to prevent potential remote code execution exploits.
* <p>
* In order to re-enable serialization support for {@code WhileClosure}
* the following system property can be used (via -Dproperty=true):
* <pre>
* org.apache.commons.collections.enableUnsafeSerialization
* </pre>
*
* @since Commons Collections 3.0
* @version $Revision: 1713845 $ $Date: 2015-11-11 15:02:16 +0100 (Wed, 11 Nov 2015) $
*
* @author Stephen Colebourne
*/
public class WhileClosure implements Closure, Serializable {
Serial version UID /** Serial version UID */
private static final long serialVersionUID = -3110538116913760108L;
The test condition /** The test condition */
private final Predicate iPredicate;
The closure to call /** The closure to call */
private final Closure iClosure;
The flag, true is a do loop, false is a while /** The flag, true is a do loop, false is a while */
private final boolean iDoLoop;
Factory method that performs validation.
Params: - predicate – the predicate used to evaluate when the loop terminates, not null
- closure – the closure the execute, not null
- doLoop – true to act as a do-while loop, always executing the closure once
Throws: - IllegalArgumentException – if the predicate or closure is null
Returns: the while
closure
/**
* Factory method that performs validation.
*
* @param predicate the predicate used to evaluate when the loop terminates, not null
* @param closure the closure the execute, not null
* @param doLoop true to act as a do-while loop, always executing the closure once
* @return the <code>while</code> closure
* @throws IllegalArgumentException if the predicate or closure is null
*/
public static Closure getInstance(Predicate predicate, Closure closure, boolean doLoop) {
if (predicate == null) {
throw new IllegalArgumentException("Predicate must not be null");
}
if (closure == null) {
throw new IllegalArgumentException("Closure must not be null");
}
return new WhileClosure(predicate, closure, doLoop);
}
Constructor that performs no validation.
Use getInstance
if you want that.
Params: - predicate – the predicate used to evaluate when the loop terminates, not null
- closure – the closure the execute, not null
- doLoop – true to act as a do-while loop, always executing the closure once
/**
* Constructor that performs no validation.
* Use <code>getInstance</code> if you want that.
*
* @param predicate the predicate used to evaluate when the loop terminates, not null
* @param closure the closure the execute, not null
* @param doLoop true to act as a do-while loop, always executing the closure once
*/
public WhileClosure(Predicate predicate, Closure closure, boolean doLoop) {
super();
iPredicate = predicate;
iClosure = closure;
iDoLoop = doLoop;
}
Executes the closure until the predicate is false.
Params: - input – the input object
/**
* Executes the closure until the predicate is false.
*
* @param input the input object
*/
public void execute(Object input) {
if (iDoLoop) {
iClosure.execute(input);
}
while (iPredicate.evaluate(input)) {
iClosure.execute(input);
}
}
Gets the predicate in use.
Returns: the predicate Since: Commons Collections 3.1
/**
* Gets the predicate in use.
*
* @return the predicate
* @since Commons Collections 3.1
*/
public Predicate getPredicate() {
return iPredicate;
}
Gets the closure.
Returns: the closure Since: Commons Collections 3.1
/**
* Gets the closure.
*
* @return the closure
* @since Commons Collections 3.1
*/
public Closure getClosure() {
return iClosure;
}
Is the loop a do-while loop.
Returns: true is do-while, false if while Since: Commons Collections 3.1
/**
* Is the loop a do-while loop.
*
* @return true is do-while, false if while
* @since Commons Collections 3.1
*/
public boolean isDoLoop() {
return iDoLoop;
}
Overrides the default writeObject implementation to prevent
serialization (see COLLECTIONS-580).
/**
* Overrides the default writeObject implementation to prevent
* serialization (see COLLECTIONS-580).
*/
private void writeObject(ObjectOutputStream os) throws IOException {
FunctorUtils.checkUnsafeSerialization(WhileClosure.class);
os.defaultWriteObject();
}
Overrides the default readObject implementation to prevent
de-serialization (see COLLECTIONS-580).
/**
* Overrides the default readObject implementation to prevent
* de-serialization (see COLLECTIONS-580).
*/
private void readObject(ObjectInputStream is) throws ClassNotFoundException, IOException {
FunctorUtils.checkUnsafeSerialization(WhileClosure.class);
is.defaultReadObject();
}
}