-
-
Save Ch35Tnut/bbfbdf7602d0a3dcc9182c2fd5ccc9fe to your computer and use it in GitHub Desktop.
An example agent that intercepts a method of the bootstrap class loader. Tested with Byte Buddy 1.14.11 on JDKs 8 to 21.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package net.bytebuddy; | |
import net.bytebuddy.agent.ByteBuddyAgent; | |
import net.bytebuddy.agent.builder.AgentBuilder; | |
import net.bytebuddy.dynamic.ClassFileLocator; | |
import net.bytebuddy.dynamic.loading.ClassInjector; | |
import net.bytebuddy.implementation.MethodDelegation; | |
import net.bytebuddy.implementation.bind.annotation.SuperCall; | |
import net.bytebuddy.matcher.ElementMatchers; | |
import java.lang.instrument.Instrumentation; | |
import java.net.URL; | |
import java.util.Collections; | |
import java.util.concurrent.Callable; | |
import static net.bytebuddy.matcher.ElementMatchers.none; | |
/** | |
* Inspired by <a href="https://github.com/apache/skywalking">Apache SkyWalking</a>, specifically | |
* <a href="https://github.com/apache/skywalking/blob/bc64c6a12770031478d29e2f19004796584374c9/apm-sniffer/apm-agent-core/src/main/java/org/apache/skywalking/apm/agent/core/plugin/bootstrap/BootstrapInstrumentBoost.java"> | |
* this class</a>. Discussed in <a href="https://github.com/raphw/byte-buddy/issues/697">Byte Buddy issue #697</a>. | |
* <p> | |
* Successfully tested on JDKs 8 to 21. Should print: | |
* <pre> | |
* Intercepted! | |
* GET | |
* </pre> | |
*/ | |
public class BootstrapAgent { | |
public static void main(String[] args) throws Exception { | |
premain(null, ByteBuddyAgent.install()); | |
Object urlConnection = new URL("http://www.google.com").openConnection(); | |
System.out.println(urlConnection.getClass().getMethod("getRequestMethod").invoke(urlConnection)); | |
} | |
public static void premain(String arg, Instrumentation instrumentation) throws Exception { | |
ClassInjector.UsingUnsafe.Factory factory = ClassInjector.UsingUnsafe.Factory.resolve(instrumentation); | |
factory.make(null, null).injectRaw( | |
Collections.singletonMap( | |
MyInterceptor.class.getName(), | |
ClassFileLocator.ForClassLoader.read(MyInterceptor.class) | |
) | |
); | |
AgentBuilder agentBuilder = new AgentBuilder.Default(); | |
agentBuilder = agentBuilder.with(new AgentBuilder.InjectionStrategy.UsingUnsafe.OfFactory(factory)); | |
agentBuilder | |
.ignore(none()) | |
.assureReadEdgeFromAndTo(instrumentation, Class.forName("java.net.HttpURLConnection")) | |
.assureReadEdgeFromAndTo(instrumentation, MyInterceptor.class) | |
.ignore(ElementMatchers.nameStartsWith("net.bytebuddy.")) | |
.type(ElementMatchers.nameContains("HttpURLConnection")) | |
.transform((builder, typeDescription, classLoader, module, protectionDomain) -> builder | |
.method(ElementMatchers.named("getRequestMethod")) | |
.intercept(MethodDelegation.to(MyInterceptor.class)) | |
) | |
.installOn(instrumentation); | |
} | |
public static class MyInterceptor { | |
public static String intercept(@SuperCall Callable<String> zuper) throws Exception { | |
System.out.println("Intercepted!"); | |
return zuper.call(); | |
} | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment