/* * Copyright (C) 2015 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.android.tools.lint.checks; import static com.android.SdkConstants.ANDROID_URI; import static com.android.SdkConstants.ATTR_NAME; import static com.android.SdkConstants.ATTR_VALUE; import static com.android.SdkConstants.CLASS_INTENT; import static com.android.SdkConstants.INT_DEF_ANNOTATION; import static com.android.SdkConstants.R_CLASS; import static com.android.SdkConstants.STRING_DEF_ANNOTATION; import static com.android.SdkConstants.SUPPORT_ANNOTATIONS_PREFIX; import static com.android.SdkConstants.TAG_PERMISSION; import static com.android.SdkConstants.TAG_USES_PERMISSION; import static com.android.SdkConstants.TYPE_DEF_FLAG_ATTRIBUTE; import static com.android.resources.ResourceType.COLOR; import static com.android.resources.ResourceType.DRAWABLE; import static com.android.resources.ResourceType.MIPMAP; import static com.android.tools.lint.checks.PermissionFinder.Operation.ACTION; import static com.android.tools.lint.checks.PermissionFinder.Operation.READ; import static com.android.tools.lint.checks.PermissionFinder.Operation.WRITE; import static com.android.tools.lint.checks.PermissionRequirement.ATTR_PROTECTION_LEVEL; import static com.android.tools.lint.checks.PermissionRequirement.VALUE_DANGEROUS; import static com.android.tools.lint.detector.api.JavaContext.findSurroundingMethod; import static com.android.tools.lint.detector.api.JavaContext.getParentOfType; import com.android.annotations.NonNull; import com.android.annotations.Nullable; import com.android.resources.ResourceType; import com.android.sdklib.AndroidVersion; import com.android.tools.lint.checks.PermissionFinder.Operation; import com.android.tools.lint.checks.PermissionFinder.Result; import com.android.tools.lint.checks.PermissionHolder.SetPermissionLookup; import com.android.tools.lint.client.api.JavaParser.ResolvedAnnotation; import com.android.tools.lint.client.api.JavaParser.ResolvedClass; import com.android.tools.lint.client.api.JavaParser.ResolvedField; import com.android.tools.lint.client.api.JavaParser.ResolvedMethod; import com.android.tools.lint.client.api.JavaParser.ResolvedNode; import com.android.tools.lint.client.api.JavaParser.TypeDescriptor; import com.android.tools.lint.client.api.LintClient; import com.android.tools.lint.detector.api.Category; import com.android.tools.lint.detector.api.ConstantEvaluator; import com.android.tools.lint.detector.api.Detector; import com.android.tools.lint.detector.api.Implementation; import com.android.tools.lint.detector.api.Issue; import com.android.tools.lint.detector.api.JavaContext; import com.android.tools.lint.detector.api.Project; import com.android.tools.lint.detector.api.Scope; import com.android.tools.lint.detector.api.Severity; import com.android.utils.XmlUtils; import com.google.common.collect.Lists; import com.google.common.collect.Sets; import org.w3c.dom.Document; import org.w3c.dom.Element; import org.w3c.dom.NodeList; import java.io.File; import java.util.ArrayList; import java.util.Arrays; import java.util.Collections; import java.util.Iterator; import java.util.List; import java.util.ListIterator; import java.util.Locale; import java.util.Set; import lombok.ast.ArrayCreation; import lombok.ast.ArrayInitializer; import lombok.ast.AstVisitor; import lombok.ast.BinaryExpression; import lombok.ast.BinaryOperator; import lombok.ast.Catch; import lombok.ast.ConstructorInvocation; import lombok.ast.EnumConstant; import lombok.ast.Expression; import lombok.ast.ExpressionStatement; import lombok.ast.FloatingPointLiteral; import lombok.ast.ForwardingAstVisitor; import lombok.ast.InlineIfExpression; import lombok.ast.IntegralLiteral; import lombok.ast.MethodDeclaration; import lombok.ast.MethodInvocation; import lombok.ast.Node; import lombok.ast.NullLiteral; import lombok.ast.Select; import lombok.ast.Statement; import lombok.ast.StringLiteral; import lombok.ast.Try; import lombok.ast.TypeReference; import lombok.ast.UnaryExpression; import lombok.ast.UnaryOperator; import lombok.ast.VariableDeclaration; import lombok.ast.VariableDefinition; import lombok.ast.VariableDefinitionEntry; import lombok.ast.VariableReference; /** * Looks up annotations on method calls and enforces the various things they * express, e.g. for {@code @CheckReturn} it makes sure the return value is used, * for {@code ColorInt} it ensures that a proper color integer is passed in, etc. * * TODO: Throw in some annotation usage checks here too; e.g. specifying @Size without parameters, * specifying toInclusive without setting to, combining @ColorInt with any @ResourceTypeRes, * using @CheckResult on a void method, etc. */ public class SupportAnnotationDetector extends Detector implements Detector.JavaScanner { public static final Implementation IMPLEMENTATION = new Implementation(SupportAnnotationDetector.class, Scope.JAVA_FILE_SCOPE); /** Method result should be used */ public static final Issue RANGE = Issue.create( "Range", //$NON-NLS-1$ "Outside Range", "Some parameters are required to in a particular numerical range; this check " + "makes sure that arguments passed fall within the range. For arrays, Strings " + "and collections this refers to the size or length.", Category.CORRECTNESS, 6, Severity.ERROR, IMPLEMENTATION); /** * Attempting to set a resource id as a color */ public static final Issue RESOURCE_TYPE = Issue.create( "ResourceType", //$NON-NLS-1$ "Wrong Resource Type", "Ensures that resource id's passed to APIs are of the right type; for example, " + "calling `Resources.getColor(R.string.name)` is wrong.", Category.CORRECTNESS, 7, Severity.FATAL, IMPLEMENTATION); /** Attempting to set a resource id as a color */ public static final Issue COLOR_USAGE = Issue.create( "ResourceAsColor", //$NON-NLS-1$ "Should pass resolved color instead of resource id", "Methods that take a color in the form of an integer should be passed " + "an RGB triple, not the actual color resource id. You must call " + "`getResources().getColor(resource)` to resolve the actual color value first.", Category.CORRECTNESS, 7, Severity.ERROR, IMPLEMENTATION); /** Passing the wrong constant to an int or String method */ public static final Issue TYPE_DEF = Issue.create( "WrongConstant", //$NON-NLS-1$ "Incorrect constant", "Ensures that when parameter in a method only allows a specific set " + "of constants, calls obey those rules.", Category.SECURITY, 6, Severity.ERROR, IMPLEMENTATION); /** Method result should be used */ public static final Issue CHECK_RESULT = Issue.create( "CheckResult", //$NON-NLS-1$ "Ignoring results", "Some methods have no side effects, an calling them without doing something " + "without the result is suspicious. ", Category.CORRECTNESS, 6, Severity.WARNING, IMPLEMENTATION); /** Failing to enforce security by just calling check permission */ public static final Issue CHECK_PERMISSION = Issue.create( "UseCheckPermission", //$NON-NLS-1$ "Using the result of check permission calls", "You normally want to use the result of checking a permission; these methods " + "return whether the permission is held; they do not throw an error if the permission " + "is not granted. Code which does not do anything with the return value probably " + "meant to be calling the enforce methods instead, e.g. rather than " + "`Context#checkCallingPermission` it should call `Context#enforceCallingPermission`.", Category.SECURITY, 6, Severity.WARNING, IMPLEMENTATION); /** Method result should be used */ public static final Issue MISSING_PERMISSION = Issue.create( "MissingPermission", //$NON-NLS-1$ "Missing Permissions", "This check scans through your code and libraries and looks at the APIs being used, " + "and checks this against the set of permissions required to access those APIs. If " + "the code using those APIs is called at runtime, then the program will crash.\n" + "\n" + "Furthermore, for permissions that are revocable (with targetSdkVersion 23), client " + "code must also be prepared to handle the calls throwing an exception if the user " + "rejects the request for permission at runtime.", Category.CORRECTNESS, 9, Severity.ERROR, IMPLEMENTATION); /** Passing the wrong constant to an int or String method */ public static final Issue THREAD = Issue.create( "WrongThread", //$NON-NLS-1$ "Wrong Thread", "Ensures that a method which expects to be called on a specific thread, is actually " + "called from that thread. For example, calls on methods in widgets should always " + "be made on the UI thread.", Category.CORRECTNESS, 6, Severity.ERROR, IMPLEMENTATION) .addMoreInfo( "http://developer.android.com/guide/components/processes-and-threads.html#Threads"); public static final String CHECK_RESULT_ANNOTATION = SUPPORT_ANNOTATIONS_PREFIX + "CheckResult"; //$NON-NLS-1$ public static final String COLOR_INT_ANNOTATION = SUPPORT_ANNOTATIONS_PREFIX + "ColorInt"; //$NON-NLS-1$ public static final String INT_RANGE_ANNOTATION = SUPPORT_ANNOTATIONS_PREFIX + "IntRange"; //$NON-NLS-1$ public static final String FLOAT_RANGE_ANNOTATION = SUPPORT_ANNOTATIONS_PREFIX + "FloatRange"; //$NON-NLS-1$ public static final String SIZE_ANNOTATION = SUPPORT_ANNOTATIONS_PREFIX + "Size"; //$NON-NLS-1$ public static final String PERMISSION_ANNOTATION = SUPPORT_ANNOTATIONS_PREFIX + "RequiresPermission"; //$NON-NLS-1$ public static final String UI_THREAD_ANNOTATION = SUPPORT_ANNOTATIONS_PREFIX + "UiThread"; //$NON-NLS-1$ public static final String MAIN_THREAD_ANNOTATION = SUPPORT_ANNOTATIONS_PREFIX + "MainThread"; //$NON-NLS-1$ public static final String WORKER_THREAD_ANNOTATION = SUPPORT_ANNOTATIONS_PREFIX + "WorkerThread"; //$NON-NLS-1$ public static final String BINDER_THREAD_ANNOTATION = SUPPORT_ANNOTATIONS_PREFIX + "BinderThread"; //$NON-NLS-1$ public static final String PERMISSION_ANNOTATION_READ = PERMISSION_ANNOTATION + ".Read"; //$NON-NLS-1$ public static final String PERMISSION_ANNOTATION_WRITE = PERMISSION_ANNOTATION + ".Write"; //$NON-NLS-1$ public static final String RES_SUFFIX = "Res"; public static final String THREAD_SUFFIX = "Thread"; public static final String ATTR_SUGGEST = "suggest"; public static final String ATTR_TO = "to"; public static final String ATTR_FROM = "from"; public static final String ATTR_FROM_INCLUSIVE = "fromInclusive"; public static final String ATTR_TO_INCLUSIVE = "toInclusive"; public static final String ATTR_MULTIPLE = "multiple"; public static final String ATTR_MIN = "min"; public static final String ATTR_MAX = "max"; public static final String ATTR_ALL_OF = "allOf"; public static final String ATTR_ANY_OF = "anyOf"; public static final String ATTR_CONDITIONAL = "conditional"; /** * Marker ResourceType used to signify that an expression is of type {@code @ColorInt}, * which isn't actually a ResourceType but one we want to specifically compare with. * We're using {@link ResourceType#PUBLIC} because that one won't appear in the R * class (and ResourceType is an enum we can't just create new constants for.) */ public static final ResourceType COLOR_INT_MARKER_TYPE = ResourceType.PUBLIC; /** * Constructs a new {@link SupportAnnotationDetector} check */ public SupportAnnotationDetector() { } private void checkMethodAnnotation( @NonNull JavaContext context, @NonNull ResolvedMethod method, @NonNull Node node, @NonNull ResolvedAnnotation annotation) { String signature = annotation.getSignature(); if (CHECK_RESULT_ANNOTATION.equals(signature) || signature.endsWith(".CheckReturnValue")) { // support findbugs annotation too checkResult(context, node, annotation); } else if (signature.equals(PERMISSION_ANNOTATION)) { PermissionRequirement requirement = PermissionRequirement.create(context, annotation); checkPermission(context, node, method, null, requirement); } else if (signature.endsWith(THREAD_SUFFIX) && signature.startsWith(SUPPORT_ANNOTATIONS_PREFIX)) { checkThreading(context, node, method, signature); } } private void checkParameterAnnotation( @NonNull JavaContext context, @NonNull Node argument, @NonNull Node call, @NonNull ResolvedMethod method, @NonNull ResolvedAnnotation annotation, @NonNull Iterable<ResolvedAnnotation> allAnnotations) { String signature = annotation.getSignature(); if (COLOR_INT_ANNOTATION.equals(signature)) { checkColor(context, argument); } else if (signature.equals(INT_RANGE_ANNOTATION)) { checkIntRange(context, annotation, argument, allAnnotations); } else if (signature.equals(FLOAT_RANGE_ANNOTATION)) { checkFloatRange(context, annotation, argument); } else if (signature.equals(SIZE_ANNOTATION)) { checkSize(context, annotation, argument); } else if (signature.startsWith(PERMISSION_ANNOTATION)) { // PERMISSION_ANNOTATION, PERMISSION_ANNOTATION_READ, PERMISSION_ANNOTATION_WRITE // When specified on a parameter, that indicates that we're dealing with // a permission requirement on this *method* which depends on the value // supplied by this parameter checkParameterPermission(context, signature, call, method, argument); } else { // We only run @IntDef, @StringDef and @<Type>Res checks if we're not // running inside Android Studio / IntelliJ where there are already inspections // covering the same warnings (using IntelliJ's own data flow analysis); we // don't want to (a) create redundant warnings or (b) work harder than we // have to if (signature.equals(INT_DEF_ANNOTATION)) { boolean flag = annotation.getValue(TYPE_DEF_FLAG_ATTRIBUTE) == Boolean.TRUE; checkTypeDefConstant(context, annotation, argument, null, flag, allAnnotations); } else if (signature.equals(STRING_DEF_ANNOTATION)) { checkTypeDefConstant(context, annotation, argument, null, false, allAnnotations); } else if (signature.endsWith(RES_SUFFIX)) { String typeString = signature.substring(SUPPORT_ANNOTATIONS_PREFIX.length(), signature.length() - RES_SUFFIX.length()).toLowerCase(Locale.US); ResourceType type = ResourceType.getEnum(typeString); if (type != null) { checkResourceType(context, argument, type); } else if (typeString.equals("any")) { // @AnyRes checkResourceType(context, argument, null); } } } } private void checkParameterPermission( @NonNull JavaContext context, @NonNull String signature, @NonNull Node call, @NonNull ResolvedMethod method, @NonNull Node argument) { Operation operation = null; if (signature.equals(PERMISSION_ANNOTATION_READ)) { operation = READ; } else if (signature.equals(PERMISSION_ANNOTATION_WRITE)) { operation = WRITE; } else { TypeDescriptor type = context.getType(argument); if (type == null) { return; } if (type.matchesSignature(CLASS_INTENT)) { operation = ACTION; } } if (operation == null) { return; } Result result = PermissionFinder.findRequiredPermissions(operation, context, argument); if (result != null) { checkPermission(context, call, method, result, result.requirement); } } private static void checkColor(@NonNull JavaContext context, @NonNull Node argument) { if (argument instanceof InlineIfExpression) { InlineIfExpression expression = (InlineIfExpression) argument; checkColor(context, expression.astIfTrue()); checkColor(context, expression.astIfFalse()); return; } List<ResourceType> types = getResourceTypes(context, argument); if (types != null && types.contains(ResourceType.COLOR)) { String message = String.format( "Should pass resolved color instead of resource id here: " + "`getResources().getColor(%1$s)`", argument.toString()); context.report(COLOR_USAGE, argument, context.getLocation(argument), message); } } private void checkPermission( @NonNull JavaContext context, @NonNull Node node, @Nullable ResolvedMethod method, @Nullable Result result, @NonNull PermissionRequirement requirement) { if (requirement.isConditional()) { return; } PermissionHolder permissions = getPermissions(context); if (!requirement.isSatisfied(permissions)) { // See if it looks like we're holding the permission implicitly by @RequirePermission // annotations in the surrounding context permissions = addLocalPermissions(context, permissions, node); if (!requirement.isSatisfied(permissions)) { Operation operation; String name; if (result != null) { name = result.name; operation = result.operation; } else { assert method != null; name = method.getContainingClass().getSimpleName() + "." + method.getName(); operation = Operation.CALL; } String message = getMissingPermissionMessage(requirement, name, permissions, operation); context.report(MISSING_PERMISSION, node, context.getLocation(node), message); } } else if (requirement.isRevocable(permissions) && context.getMainProject().getTargetSdkVersion().getFeatureLevel() >= 23) { // Ensure that the caller is handling a security exception // First check to see if we're inside a try/catch which catches a SecurityException // (or some wider exception than that). Check for nested try/catches too. boolean handlesMissingPermission = false; Node parent = node; while (true) { Try tryCatch = getParentOfType(parent, Try.class); if (tryCatch == null) { break; } else { for (Catch aCatch : tryCatch.astCatches()) { TypeReference catchType = aCatch.astExceptionDeclaration(). astTypeReference(); if (isSecurityException(context, catchType)) { handlesMissingPermission = true; break; } } parent = tryCatch; } } // If not, check to see if the method itself declares that it throws a // SecurityException or something wider. if (!handlesMissingPermission) { MethodDeclaration declaration = getParentOfType(parent, MethodDeclaration.class); if (declaration != null) { for (TypeReference typeReference : declaration.astThrownTypeReferences()) { if (isSecurityException(context, typeReference)) { handlesMissingPermission = true; break; } } } } // If not, check to see if the code is deliberately checking to see if the // given permission is available. if (!handlesMissingPermission) { Node methodNode = JavaContext.findSurroundingMethod(node); if (methodNode != null) { CheckPermissionVisitor visitor = new CheckPermissionVisitor(node); methodNode.accept(visitor); handlesMissingPermission = visitor.checksPermission(); } } if (!handlesMissingPermission) { String message = getUnhandledPermissionMessage(); context.report(MISSING_PERMISSION, node, context.getLocation(node), message); } } } @NonNull private static PermissionHolder addLocalPermissions( @NonNull JavaContext context, @NonNull PermissionHolder permissions, @NonNull Node node) { // Accumulate @RequirePermissions available in the local context Node methodNode = JavaContext.findSurroundingMethod(node); if (methodNode == null) { return permissions; } ResolvedNode resolved = context.resolve(methodNode); if (!(resolved instanceof ResolvedMethod)) { return permissions; } ResolvedMethod method = (ResolvedMethod) resolved; ResolvedAnnotation annotation = method.getAnnotation(PERMISSION_ANNOTATION); permissions = mergeAnnotationPermissions(context, permissions, annotation); annotation = method.getContainingClass().getAnnotation(PERMISSION_ANNOTATION); permissions = mergeAnnotationPermissions(context, permissions, annotation); return permissions; } @NonNull private static PermissionHolder mergeAnnotationPermissions( @NonNull JavaContext context, @NonNull PermissionHolder permissions, @Nullable ResolvedAnnotation annotation) { if (annotation != null) { PermissionRequirement requirement = PermissionRequirement.create(context, annotation); permissions = SetPermissionLookup.join(permissions, requirement); } return permissions; } /** Returns the error message shown when a given call is missing one or more permissions */ public static String getMissingPermissionMessage(@NonNull PermissionRequirement requirement, @NonNull String callName, @NonNull PermissionHolder permissions, @NonNull Operation operation) { return String.format("Missing permissions required %1$s %2$s: %3$s", operation.prefix(), callName, requirement.describeMissingPermissions(permissions)); } /** Returns the error message shown when a revocable permission call is not properly handled */ public static String getUnhandledPermissionMessage() { return "Call requires permission which may be rejected by user: code should explicitly " + "check to see if permission is available (with `checkPermission`) or handle " + "a potential `SecurityException`"; } /** * Visitor which looks through a method, up to a given call (the one requiring a * permission) and checks whether it's preceeded by a call to checkPermission or * checkCallingPermission or enforcePermission etc. * <p> * Currently it only looks for the presence of this check; it does not perform * flow analysis to determine whether the check actually affects program flow * up to the permission call, or whether the check permission is checking for * permissions sufficient to satisfy the permission requirement of the target call, * or whether the check return value (== PERMISSION_GRANTED vs != PERMISSION_GRANTED) * is handled correctly, etc. */ private static class CheckPermissionVisitor extends ForwardingAstVisitor { private boolean mChecksPermission; private boolean mDone; private final Node mTarget; public CheckPermissionVisitor(@NonNull Node target) { mTarget = target; } @Override public boolean visitNode(Node node) { return mDone; } @Override public boolean visitMethodInvocation(MethodInvocation node) { if (node == mTarget) { mDone = true; } String name = node.astName().astValue(); if ((name.startsWith("check") || name.startsWith("enforce")) && name.endsWith("Permission")) { mChecksPermission = true; mDone = true; } return super.visitMethodInvocation(node); } public boolean checksPermission() { return mChecksPermission; } } private static boolean isSecurityException( @NonNull JavaContext context, @NonNull TypeReference typeReference) { TypeDescriptor type = context.getType(typeReference); return type != null && (type.matchesSignature("java.lang.SecurityException") || type.matchesSignature("java.lang.RuntimeException") || type.matchesSignature("java.lang.Exception") || type.matchesSignature("java.lang.Throwable")); } private PermissionHolder mPermissions; private PermissionHolder getPermissions( @NonNull JavaContext context) { if (mPermissions == null) { Set<String> permissions = Sets.newHashSetWithExpectedSize(30); Set<String> revocable = Sets.newHashSetWithExpectedSize(4); LintClient client = context.getClient(); // Gather permissions from all projects that contribute to the // main project. Project mainProject = context.getMainProject(); for (File manifest : mainProject.getManifestFiles()) { addPermissions(client, permissions, revocable, manifest); } for (Project library : mainProject.getAllLibraries()) { for (File manifest : library.getManifestFiles()) { addPermissions(client, permissions, revocable, manifest); } } AndroidVersion minSdkVersion = mainProject.getMinSdkVersion(); AndroidVersion targetSdkVersion = mainProject.getTargetSdkVersion(); mPermissions = new SetPermissionLookup(permissions, revocable, minSdkVersion, targetSdkVersion); } return mPermissions; } private static void addPermissions(@NonNull LintClient client, @NonNull Set<String> permissions, @NonNull Set<String> revocable, @NonNull File manifest) { Document document = XmlUtils.parseDocumentSilently(client.readFile(manifest), true); if (document == null) { return; } Element root = document.getDocumentElement(); if (root == null) { return; } NodeList children = root.getChildNodes(); for (int i = 0, n = children.getLength(); i < n; i++) { org.w3c.dom.Node item = children.item(i); if (item.getNodeType() != org.w3c.dom.Node.ELEMENT_NODE) { continue; } String nodeName = item.getNodeName(); if (nodeName.equals(TAG_USES_PERMISSION)) { Element element = (Element)item; String name = element.getAttributeNS(ANDROID_URI, ATTR_NAME); if (!name.isEmpty()) { permissions.add(name); } } else if (nodeName.equals(TAG_PERMISSION)) { Element element = (Element)item; String protectionLevel = element.getAttributeNS(ANDROID_URI, ATTR_PROTECTION_LEVEL); if (VALUE_DANGEROUS.equals(protectionLevel)) { String name = element.getAttributeNS(ANDROID_URI, ATTR_NAME); if (!name.isEmpty()) { revocable.add(name); } } } } } private static void checkResult(@NonNull JavaContext context, @NonNull Node node, @NonNull ResolvedAnnotation annotation) { if (node.getParent() instanceof ExpressionStatement) { String methodName = JavaContext.getMethodName(node); Object suggested = annotation.getValue(ATTR_SUGGEST); // Failing to check permissions is a potential security issue (and had an existing // dedicated issue id before which people may already have configured with a // custom severity in their LintOptions etc) so continue to use that issue // (which also has category Security rather than Correctness) for these: Issue issue = CHECK_RESULT; if (methodName != null && methodName.startsWith("check") && methodName.contains("Permission")) { issue = CHECK_PERMISSION; } String message = String.format("The result of `%1$s` is not used", methodName); if (suggested != null) { // TODO: Resolve suggest attribute (e.g. prefix annotation class if it starts // with "#" etc? message = String.format( "The result of `%1$s` is not used; did you mean to call `%2$s`?", methodName, suggested.toString()); } context.report(issue, node, context.getLocation(node), message); } } private static void checkThreading( @NonNull JavaContext context, @NonNull Node node, @NonNull ResolvedMethod method, @NonNull String annotation) { String threadContext = getThreadContext(context, node); if (threadContext != null && !isCompatibleThread(threadContext, annotation)) { String message = String.format("Method %1$s must be called from the `%2$s` thread, currently inferred thread is `%3$s` thread", method.getName(), describeThread(annotation), describeThread(threadContext)); context.report(THREAD, node, context.getLocation(node), message); } } @NonNull public static String describeThread(@NonNull String annotation) { if (UI_THREAD_ANNOTATION.equals(annotation)) { return "UI"; } else if (MAIN_THREAD_ANNOTATION.equals(annotation)) { return "main"; } else if (BINDER_THREAD_ANNOTATION.equals(annotation)) { return "binder"; } else if (WORKER_THREAD_ANNOTATION.equals(annotation)) { return "worker"; } else { return "other"; } } /** returns true if the two threads are compatible */ public static boolean isCompatibleThread(@NonNull String thread1, @NonNull String thread2) { if (thread1.equals(thread2)) { return true; } // Allow @UiThread and @MainThread to be combined if (thread1.equals(UI_THREAD_ANNOTATION)) { if (thread2.equals(MAIN_THREAD_ANNOTATION)) { return true; } } else if (thread1.equals(MAIN_THREAD_ANNOTATION)) { if (thread2.equals(UI_THREAD_ANNOTATION)) { return true; } } return false; } /** Attempts to infer the current thread context at the site of the given method call */ @Nullable private static String getThreadContext(@NonNull JavaContext context, @NonNull Node methodCall) { Node node = findSurroundingMethod(methodCall); if (node != null) { ResolvedNode resolved = context.resolve(node); if (resolved instanceof ResolvedMethod) { ResolvedMethod method = (ResolvedMethod) resolved; ResolvedClass cls = method.getContainingClass(); while (method != null) { for (ResolvedAnnotation annotation : method.getAnnotations()) { String name = annotation.getSignature(); if (name.startsWith(SUPPORT_ANNOTATIONS_PREFIX) && name.endsWith(THREAD_SUFFIX)) { return name; } } method = method.getSuperMethod(); } // See if we're extending a class with a known threading context while (cls != null) { for (ResolvedAnnotation annotation : cls.getAnnotations()) { String name = annotation.getSignature(); if (name.startsWith(SUPPORT_ANNOTATIONS_PREFIX) && name.endsWith(THREAD_SUFFIX)) { return name; } } cls = cls.getSuperClass(); } } } // In the future, we could also try to infer the threading context using // other heuristics. For example, if we're in a method with unknown threading // context, but we see that the method is called by another method with a known // threading context, we can infer that that threading context is the context for // this thread too (assuming the call is direct). return null; } private static boolean isNumber(@NonNull Node argument) { return argument instanceof IntegralLiteral || argument instanceof UnaryExpression && ((UnaryExpression) argument).astOperator() == UnaryOperator.UNARY_MINUS && ((UnaryExpression) argument).astOperand() instanceof IntegralLiteral; } private static boolean isZero(@NonNull Node argument) { return argument instanceof IntegralLiteral && ((IntegralLiteral) argument).astIntValue() == 0; } private static boolean isMinusOne(@NonNull Node argument) { return argument instanceof UnaryExpression && ((UnaryExpression) argument).astOperator() == UnaryOperator.UNARY_MINUS && ((UnaryExpression) argument).astOperand() instanceof IntegralLiteral && ((IntegralLiteral) ((UnaryExpression) argument).astOperand()).astIntValue() == 1; } private static void checkResourceType( @NonNull JavaContext context, @NonNull Node argument, @Nullable ResourceType expectedType) { List<ResourceType> actual = getResourceTypes(context, argument); if (actual == null && (!isNumber(argument) || isZero(argument) || isMinusOne(argument)) ) { return; } else if (actual != null && (expectedType == null || actual.contains(expectedType) || expectedType == DRAWABLE && (actual.contains(COLOR) || actual.contains(MIPMAP)))) { return; } String message; if (actual != null && actual.size() == 1 && actual.get(0) == COLOR_INT_MARKER_TYPE) { message = "Expected a color resource id (`R.color.`) but received an RGB integer"; } else if (expectedType == COLOR_INT_MARKER_TYPE) { message = String.format("Should pass resolved color instead of resource id here: " + "`getResources().getColor(%1$s)`", argument.toString()); } else if (expectedType != null) { message = String.format( "Expected resource of type %1$s", expectedType.getName()); } else { message = "Expected resource identifier (`R`.type.`name`)"; } context.report(RESOURCE_TYPE, argument, context.getLocation(argument), message); } @Nullable private static List<ResourceType> getResourceTypes(@NonNull JavaContext context, @NonNull Node argument) { if (argument instanceof Select) { Select node = (Select) argument; if (node.astOperand() instanceof Select) { Select select = (Select) node.astOperand(); if (select.astOperand() instanceof Select) { // android.R.... Select innerSelect = (Select) select.astOperand(); if (innerSelect.astIdentifier().astValue().equals(R_CLASS)) { String typeName = select.astIdentifier().astValue(); ResourceType type = ResourceType.getEnum(typeName); return type != null ? Collections.singletonList(type) : null; } } if (select.astOperand() instanceof VariableReference) { VariableReference reference = (VariableReference) select.astOperand(); if (reference.astIdentifier().astValue().equals(R_CLASS)) { String typeName = select.astIdentifier().astValue(); ResourceType type = ResourceType.getEnum(typeName); return type != null ? Collections.singletonList(type) : null; } } } // Arbitrary packages -- android.R.type.name, foo.bar.R.type.name if (node.astIdentifier().astValue().equals(R_CLASS)) { Node parent = node.getParent(); if (parent instanceof Select) { Node grandParent = parent.getParent(); if (grandParent instanceof Select) { Select select = (Select) grandParent; Expression typeOperand = select.astOperand(); if (typeOperand instanceof Select) { Select typeSelect = (Select) typeOperand; String typeName = typeSelect.astIdentifier().astValue(); ResourceType type = ResourceType.getEnum(typeName); return type != null ? Collections.singletonList(type) : null; } } } } } else if (argument instanceof VariableReference) { Statement statement = getParentOfType(argument, Statement.class, false); if (statement != null) { ListIterator<Node> iterator = statement.getParent().getChildren().listIterator(); while (iterator.hasNext()) { if (iterator.next() == statement) { if (iterator.hasPrevious()) { // should always be true iterator.previous(); } break; } } String targetName = ((VariableReference)argument).astIdentifier().astValue(); while (iterator.hasPrevious()) { Node previous = iterator.previous(); if (previous instanceof VariableDeclaration) { VariableDeclaration declaration = (VariableDeclaration) previous; VariableDefinition definition = declaration.astDefinition(); for (VariableDefinitionEntry entry : definition .astVariables()) { if (entry.astInitializer() != null && entry.astName().astValue().equals(targetName)) { return getResourceTypes(context, entry.astInitializer()); } } } else if (previous instanceof ExpressionStatement) { ExpressionStatement expressionStatement = (ExpressionStatement) previous; Expression expression = expressionStatement.astExpression(); if (expression instanceof BinaryExpression && ((BinaryExpression) expression).astOperator() == BinaryOperator.ASSIGN) { BinaryExpression binaryExpression = (BinaryExpression) expression; if (targetName.equals(binaryExpression.astLeft().toString())) { return getResourceTypes(context, binaryExpression.astRight()); } } } } } } else if (argument instanceof MethodInvocation) { ResolvedNode resolved = context.resolve(argument); if (resolved != null) { for (ResolvedAnnotation annotation : resolved.getAnnotations()) { String signature = annotation.getSignature(); if (signature.equals(COLOR_INT_ANNOTATION)) { return Collections.singletonList(COLOR_INT_MARKER_TYPE); } if (signature.endsWith(RES_SUFFIX) && signature.startsWith(SUPPORT_ANNOTATIONS_PREFIX)) { String typeString = signature.substring(SUPPORT_ANNOTATIONS_PREFIX.length(), signature.length() - RES_SUFFIX.length()).toLowerCase(Locale.US); ResourceType type = ResourceType.getEnum(typeString); if (type != null) { return Collections.singletonList(type); } else if (typeString.equals("any")) { // @AnyRes ResourceType[] types = ResourceType.values(); List<ResourceType> result = Lists.newArrayListWithExpectedSize( types.length); for (ResourceType t : types) { if (t != COLOR_INT_MARKER_TYPE) { result.add(t); } } return result; } } } } } return null; } private static void checkIntRange( @NonNull JavaContext context, @NonNull ResolvedAnnotation annotation, @NonNull Node argument, @NonNull Iterable<ResolvedAnnotation> allAnnotations) { String message = getIntRangeError(context, annotation, argument); if (message != null) { if (findIntDef(allAnnotations) != null) { // Don't flag int range errors if there is an int def annotation there too; // there could be a valid @IntDef constant. (The @IntDef check will // perform range validation by calling getIntRange.) return; } context.report(RANGE, argument, context.getLocation(argument), message); } } @Nullable private static String getIntRangeError( @NonNull JavaContext context, @NonNull ResolvedAnnotation annotation, @NonNull Node argument) { Object object = ConstantEvaluator.evaluate(context, argument); if (!(object instanceof Number)) { return null; } long value = ((Number)object).longValue(); long from = getLongAttribute(annotation, ATTR_FROM, Long.MIN_VALUE); long to = getLongAttribute(annotation, ATTR_TO, Long.MAX_VALUE); return getIntRangeError(value, from, to); } /** * Checks whether a given integer value is in the allowed range, and if so returns * null; otherwise returns a suitable error message. */ private static String getIntRangeError(long value, long from, long to) { String message = null; if (value < from || value > to) { StringBuilder sb = new StringBuilder(20); if (value < from) { sb.append("Value must be \u2265 "); sb.append(Long.toString(from)); } else { assert value > to; sb.append("Value must be \u2264 "); sb.append(Long.toString(to)); } sb.append(" (was ").append(value).append(')'); message = sb.toString(); } return message; } private static void checkFloatRange( @NonNull JavaContext context, @NonNull ResolvedAnnotation annotation, @NonNull Node argument) { Object object = ConstantEvaluator.evaluate(context, argument); if (!(object instanceof Number)) { return; } double value = ((Number)object).doubleValue(); double from = getDoubleAttribute(annotation, ATTR_FROM, Double.NEGATIVE_INFINITY); double to = getDoubleAttribute(annotation, ATTR_TO, Double.POSITIVE_INFINITY); boolean fromInclusive = getBoolean(annotation, ATTR_FROM_INCLUSIVE, true); boolean toInclusive = getBoolean(annotation, ATTR_TO_INCLUSIVE, true); String message = getFloatRangeError(value, from, to, fromInclusive, toInclusive, argument); if (message != null) { context.report(RANGE, argument, context.getLocation(argument), message); } } /** * Checks whether a given floating point value is in the allowed range, and if so returns * null; otherwise returns a suitable error message. */ @Nullable private static String getFloatRangeError(double value, double from, double to, boolean fromInclusive, boolean toInclusive, @NonNull Node node) { if (!((fromInclusive && value >= from || !fromInclusive && value > from) && (toInclusive && value <= to || !toInclusive && value < to))) { StringBuilder sb = new StringBuilder(20); if (from != Double.NEGATIVE_INFINITY) { if (to != Double.POSITIVE_INFINITY) { if (fromInclusive && value < from || !fromInclusive && value <= from) { sb.append("Value must be "); if (fromInclusive) { sb.append('\u2265'); // >= sign } else { sb.append('>'); } sb.append(' '); sb.append(Double.toString(from)); } else { assert toInclusive && value > to || !toInclusive && value >= to; sb.append("Value must be "); if (toInclusive) { sb.append('\u2264'); // <= sign } else { sb.append('<'); } sb.append(' '); sb.append(Double.toString(to)); } } else { sb.append("Value must be "); if (fromInclusive) { sb.append('\u2265'); // >= sign } else { sb.append('>'); } sb.append(' '); sb.append(Double.toString(from)); } } else if (to != Double.POSITIVE_INFINITY) { sb.append("Value must be "); if (toInclusive) { sb.append('\u2264'); // <= sign } else { sb.append('<'); } sb.append(' '); sb.append(Double.toString(to)); } sb.append(" (was "); if (node instanceof FloatingPointLiteral || node instanceof IntegralLiteral) { // Use source text instead to avoid rounding errors involved in conversion, e.g // Error: Value must be > 2.5 (was 2.490000009536743) [Range] // printAtLeastExclusive(2.49f); // ERROR // ~~~~~ String str = node.toString(); if (str.endsWith("f") || str.endsWith("F")) { str = str.substring(0, str.length() - 1); } sb.append(str); } else { sb.append(value); } sb.append(')'); return sb.toString(); } return null; } private static void checkSize( @NonNull JavaContext context, @NonNull ResolvedAnnotation annotation, @NonNull Node argument) { int actual; if (argument instanceof StringLiteral) { // Check string length StringLiteral literal = (StringLiteral) argument; String s = literal.astValue(); actual = s.length(); } else if (argument instanceof ArrayCreation) { ArrayCreation literal = (ArrayCreation) argument; ArrayInitializer initializer = literal.astInitializer(); if (initializer == null) { return; } actual = initializer.astExpressions().size(); } else { // TODO: Collections syntax, e.g. Arrays.asList => param count, emptyList=0, singleton=1, etc // TODO: Flow analysis // No flow analysis for this check yet, only checking literals passed in as parameters return; } long exact = getLongAttribute(annotation, ATTR_VALUE, -1); long min = getLongAttribute(annotation, ATTR_MIN, Long.MIN_VALUE); long max = getLongAttribute(annotation, ATTR_MAX, Long.MAX_VALUE); long multiple = getLongAttribute(annotation, ATTR_MULTIPLE, 1); String unit; boolean isString = argument instanceof StringLiteral; if (isString) { unit = "length"; } else { unit = "size"; } String message = getSizeError(actual, exact, min, max, multiple, unit); if (message != null) { context.report(RANGE, argument, context.getLocation(argument), message); } } /** * Checks whether a given size follows the given constraints, and if so returns * null; otherwise returns a suitable error message. */ private static String getSizeError(long actual, long exact, long min, long max, long multiple, @NonNull String unit) { String message = null; if (exact != -1) { if (exact != actual) { message = String.format("Expected %1$s %2$d (was %3$d)", unit, exact, actual); } } else if (actual < min || actual > max) { StringBuilder sb = new StringBuilder(20); if (actual < min) { sb.append("Expected ").append(unit).append(" \u2265 "); sb.append(Long.toString(min)); } else { assert actual > max; sb.append("Expected ").append(unit).append(" \u2264 "); sb.append(Long.toString(max)); } sb.append(" (was ").append(actual).append(')'); message = sb.toString(); } else if (actual % multiple != 0) { message = String.format("Expected %1$s to be a multiple of %2$d (was %3$d " + "and should be either %4$d or %5$d)", unit, multiple, actual, (actual / multiple) * multiple, (actual / multiple + 1) * multiple); } return message; } @Nullable private static ResolvedAnnotation findIntRange( @NonNull Iterable<ResolvedAnnotation> annotations) { for (ResolvedAnnotation annotation : annotations) { if (INT_RANGE_ANNOTATION.equals(annotation.getName())) { return annotation; } } return null; } @Nullable private static ResolvedAnnotation findIntDef( @NonNull Iterable<ResolvedAnnotation> annotations) { for (ResolvedAnnotation annotation : annotations) { if (INT_DEF_ANNOTATION.equals(annotation.getName())) { return annotation; } } return null; } private static void checkTypeDefConstant( @NonNull JavaContext context, @NonNull ResolvedAnnotation annotation, @NonNull Node argument, @Nullable Node errorNode, boolean flag, @NonNull Iterable<ResolvedAnnotation> allAnnotations) { if (argument instanceof NullLiteral) { // Accepted for @StringDef return; } if (argument instanceof StringLiteral) { StringLiteral string = (StringLiteral) argument; checkTypeDefConstant(context, annotation, argument, errorNode, false, string.astValue(), allAnnotations); } else if (argument instanceof IntegralLiteral) { IntegralLiteral literal = (IntegralLiteral) argument; int value = literal.astIntValue(); if (flag && value == 0) { // Accepted for a flag @IntDef return; } ResolvedAnnotation rangeAnnotation = findIntRange(allAnnotations); if (rangeAnnotation != null) { // Allow @IntRange on this number if (getIntRangeError(context, rangeAnnotation, literal) == null) { return; } } checkTypeDefConstant(context, annotation, argument, errorNode, flag, value, allAnnotations); } else if (isMinusOne(argument)) { // -1 is accepted unconditionally for flags if (!flag) { ResolvedAnnotation rangeAnnotation = findIntRange(allAnnotations); if (rangeAnnotation != null) { // Allow @IntRange on this number if (getIntRangeError(context, rangeAnnotation, argument) == null) { return; } } reportTypeDef(context, annotation, argument, errorNode, allAnnotations); } } else if (argument instanceof InlineIfExpression) { InlineIfExpression expression = (InlineIfExpression) argument; if (expression.astIfTrue() != null) { checkTypeDefConstant(context, annotation, expression.astIfTrue(), errorNode, flag, allAnnotations); } if (expression.astIfFalse() != null) { checkTypeDefConstant(context, annotation, expression.astIfFalse(), errorNode, flag, allAnnotations); } } else if (argument instanceof UnaryExpression) { UnaryExpression expression = (UnaryExpression) argument; UnaryOperator operator = expression.astOperator(); if (flag) { checkTypeDefConstant(context, annotation, expression.astOperand(), errorNode, true, allAnnotations); } else if (operator == UnaryOperator.BINARY_NOT) { context.report(TYPE_DEF, expression, context.getLocation(expression), "Flag not allowed here"); } else if (operator == UnaryOperator.UNARY_MINUS) { ResolvedAnnotation rangeAnnotation = findIntRange(allAnnotations); if (rangeAnnotation != null) { // Allow @IntRange on this number if (getIntRangeError(context, rangeAnnotation, argument) == null) { return; } } reportTypeDef(context, annotation, argument, errorNode, allAnnotations); } } else if (argument instanceof BinaryExpression) { // If it's ?: then check both the if and else clauses BinaryExpression expression = (BinaryExpression) argument; if (flag) { checkTypeDefConstant(context, annotation, expression.astLeft(), errorNode, true, allAnnotations); checkTypeDefConstant(context, annotation, expression.astRight(), errorNode, true, allAnnotations); } else { BinaryOperator operator = expression.astOperator(); if (operator == BinaryOperator.BITWISE_AND || operator == BinaryOperator.BITWISE_OR || operator == BinaryOperator.BITWISE_XOR) { context.report(TYPE_DEF, expression, context.getLocation(expression), "Flag not allowed here"); } } } else { ResolvedNode resolved = context.resolve(argument); if (resolved instanceof ResolvedField) { checkTypeDefConstant(context, annotation, argument, errorNode, flag, resolved, allAnnotations); } else if (argument instanceof VariableReference) { Statement statement = getParentOfType(argument, Statement.class, false); if (statement != null) { ListIterator<Node> iterator = statement.getParent().getChildren().listIterator(); while (iterator.hasNext()) { if (iterator.next() == statement) { if (iterator.hasPrevious()) { // should always be true iterator.previous(); } break; } } String targetName = ((VariableReference)argument).astIdentifier().astValue(); while (iterator.hasPrevious()) { Node previous = iterator.previous(); if (previous instanceof VariableDeclaration) { VariableDeclaration declaration = (VariableDeclaration) previous; VariableDefinition definition = declaration.astDefinition(); for (VariableDefinitionEntry entry : definition .astVariables()) { if (entry.astInitializer() != null && entry.astName().astValue().equals(targetName)) { checkTypeDefConstant(context, annotation, entry.astInitializer(), errorNode != null ? errorNode : argument, flag, allAnnotations); return; } } } else if (previous instanceof ExpressionStatement) { ExpressionStatement expressionStatement = (ExpressionStatement) previous; Expression expression = expressionStatement.astExpression(); if (expression instanceof BinaryExpression && ((BinaryExpression) expression).astOperator() == BinaryOperator.ASSIGN) { BinaryExpression binaryExpression = (BinaryExpression) expression; if (targetName.equals(binaryExpression.astLeft().toString())) { checkTypeDefConstant(context, annotation, binaryExpression.astRight(), errorNode != null ? errorNode : argument, flag, allAnnotations); return; } } } } } } } } private static void checkTypeDefConstant(@NonNull JavaContext context, @NonNull ResolvedAnnotation annotation, @NonNull Node argument, @Nullable Node errorNode, boolean flag, Object value, @NonNull Iterable<ResolvedAnnotation> allAnnotations) { Object allowed = annotation.getValue(); if (allowed instanceof Object[]) { Object[] allowedValues = (Object[]) allowed; for (Object o : allowedValues) { if (o.equals(value)) { return; } } reportTypeDef(context, argument, errorNode, flag, allowedValues, allAnnotations); } } private static void reportTypeDef(@NonNull JavaContext context, @NonNull ResolvedAnnotation annotation, @NonNull Node argument, @Nullable Node errorNode, @NonNull Iterable<ResolvedAnnotation> allAnnotations) { Object allowed = annotation.getValue(); if (allowed instanceof Object[]) { Object[] allowedValues = (Object[]) allowed; reportTypeDef(context, argument, errorNode, false, allowedValues, allAnnotations); } } private static void reportTypeDef(@NonNull JavaContext context, @NonNull Node node, @Nullable Node errorNode, boolean flag, @NonNull Object[] allowedValues, @NonNull Iterable<ResolvedAnnotation> allAnnotations) { String values = listAllowedValues(allowedValues); String message; if (flag) { message = "Must be one or more of: " + values; } else { message = "Must be one of: " + values; } ResolvedAnnotation rangeAnnotation = findIntRange(allAnnotations); if (rangeAnnotation != null) { // Allow @IntRange on this number String rangeError = getIntRangeError(context, rangeAnnotation, node); if (rangeError != null && !rangeError.isEmpty()) { message += " or " + Character.toLowerCase(rangeError.charAt(0)) + rangeError.substring(1); } } if (errorNode == null) { errorNode = node; } context.report(TYPE_DEF, errorNode, context.getLocation(errorNode), message); } private static String listAllowedValues(@NonNull Object[] allowedValues) { StringBuilder sb = new StringBuilder(); for (Object allowedValue : allowedValues) { String s; if (allowedValue instanceof Integer) { s = allowedValue.toString(); } else if (allowedValue instanceof ResolvedNode) { ResolvedNode node = (ResolvedNode) allowedValue; if (node instanceof ResolvedField) { ResolvedField field = (ResolvedField) node; String containingClassName = field.getContainingClassName(); containingClassName = containingClassName.substring(containingClassName.lastIndexOf('.') + 1); s = containingClassName + "." + field.getName(); } else { s = node.getSignature(); } } else { continue; } if (sb.length() > 0) { sb.append(", "); } sb.append(s); } return sb.toString(); } private static double getDoubleAttribute(@NonNull ResolvedAnnotation annotation, @NonNull String name, double defaultValue) { Object value = annotation.getValue(name); if (value instanceof Number) { return ((Number) value).doubleValue(); } return defaultValue; } private static long getLongAttribute(@NonNull ResolvedAnnotation annotation, @NonNull String name, long defaultValue) { Object value = annotation.getValue(name); if (value instanceof Number) { return ((Number) value).longValue(); } return defaultValue; } private static boolean getBoolean(@NonNull ResolvedAnnotation annotation, @NonNull String name, boolean defaultValue) { Object value = annotation.getValue(name); if (value instanceof Boolean) { return ((Boolean) value); } return defaultValue; } @NonNull static Iterable<ResolvedAnnotation> filterRelevantAnnotations( @NonNull Iterable<ResolvedAnnotation> annotations) { List<ResolvedAnnotation> result = null; Iterator<ResolvedAnnotation> iterator = annotations.iterator(); int index = 0; while (iterator.hasNext()) { ResolvedAnnotation annotation = iterator.next(); index++; String signature = annotation.getSignature(); if (signature.startsWith("java.")) { // @Override, @SuppressWarnings etc. Ignore continue; } if (signature.startsWith(SUPPORT_ANNOTATIONS_PREFIX)) { // Bail on the nullness annotations early since they're the most commonly // defined ones. They're not analyzed in lint yet. if (signature.endsWith(".Nullable") || signature.endsWith(".NonNull")) { continue; } // Common case: there's just one annotation; no need to create a list copy if (!iterator.hasNext() && index == 1) { return annotations; } if (result == null) { result = new ArrayList<ResolvedAnnotation>(2); } result.add(annotation); } // Special case @IntDef and @StringDef: These are used on annotations // themselves. For example, you create a new annotation named @foo.bar.Baz, // annotate it with @IntDef, and then use @foo.bar.Baz in your signatures. // Here we want to map from @foo.bar.Baz to the corresponding int def. // Don't need to compute this if performing @IntDef or @StringDef lookup ResolvedClass type = annotation.getClassType(); if (type != null) { Iterator<ResolvedAnnotation> iterator2 = type.getAnnotations().iterator(); while (iterator2.hasNext()) { ResolvedAnnotation inner = iterator2.next(); if (inner.matches(INT_DEF_ANNOTATION) || inner.matches(PERMISSION_ANNOTATION) || inner.matches(INT_RANGE_ANNOTATION) || inner.matches(STRING_DEF_ANNOTATION)) { if (!iterator.hasNext() && !iterator2.hasNext() && index == 1) { return annotations; } if (result == null) { result = new ArrayList<ResolvedAnnotation>(2); } result.add(inner); } } } } return result != null ? result : Collections.<ResolvedAnnotation>emptyList(); } // ---- Implements JavaScanner ---- @Override public List<Class<? extends Node>> getApplicableNodeTypes() { //noinspection unchecked return Arrays.<Class<? extends Node>>asList( MethodInvocation.class, ConstructorInvocation.class, EnumConstant.class); } @Nullable @Override public AstVisitor createJavaVisitor(@NonNull JavaContext context) { return new CallVisitor(context); } private class CallVisitor extends ForwardingAstVisitor { private final JavaContext mContext; public CallVisitor(JavaContext context) { mContext = context; } @Override public boolean visitMethodInvocation(@NonNull MethodInvocation call) { ResolvedNode resolved = mContext.resolve(call); if (resolved instanceof ResolvedMethod) { ResolvedMethod method = (ResolvedMethod) resolved; checkCall(call, method); } return false; } @Override public boolean visitConstructorInvocation(@NonNull ConstructorInvocation call) { ResolvedNode resolved = mContext.resolve(call); if (resolved instanceof ResolvedMethod) { ResolvedMethod method = (ResolvedMethod) resolved; checkCall(call, method); } return false; } @Override public boolean visitEnumConstant(EnumConstant node) { ResolvedNode resolved = mContext.resolve(node); if (resolved instanceof ResolvedMethod) { ResolvedMethod method = (ResolvedMethod) resolved; checkCall(node, method); } return false; } private void checkCall(@NonNull Node call, ResolvedMethod method) { Iterable<ResolvedAnnotation> annotations = method.getAnnotations(); annotations = filterRelevantAnnotations(annotations); for (ResolvedAnnotation annotation : annotations) { checkMethodAnnotation(mContext, method, call, annotation); } // Look for annotations on the class as well: these trickle // down to all the methods in the class ResolvedClass containingClass = method.getContainingClass(); annotations = containingClass.getAnnotations(); annotations = filterRelevantAnnotations(annotations); for (ResolvedAnnotation annotation : annotations) { checkMethodAnnotation(mContext, method, call, annotation); } Iterator<Expression> arguments = JavaContext.getParameters(call); for (int i = 0, n = method.getArgumentCount(); i < n && arguments.hasNext(); i++) { Expression argument = arguments.next(); annotations = method.getParameterAnnotations(i); annotations = filterRelevantAnnotations(annotations); for (ResolvedAnnotation annotation : annotations) { checkParameterAnnotation(mContext, argument, call, method, annotation, annotations); } } } } }