Generically typed code can be freely used with raw types when attempting to preserve compatibility between non-generic legacy code and newer generic code. Using raw types with generic code causes most Java compilers to issue "unchecked" warnings but still compile the code. When generic and non-generic types are used together correctly, these warnings can be ignored; at other times, these warnings can denote potentially unsafe operations.
According to the Java Language Specification [[JLS 2005]], §4.8 "Raw Types,"
The use of raw types is allowed only as a concession to compatibility of legacy code. The use of raw types in code written after the introduction of genericity into the Java programming language is strongly discouraged. It is possible that future versions of the Java programming language will disallow the use of raw types.
If a parameterized type tries to access an object that is not of the parameterized type, heap pollution occurs. For instance, consider the code snippet below.
List l = new ArrayList(); List<String> ls = l; // Produces unchecked warning
It is insufficient to rely on unchecked warnings alone to detect violations of this rule. According to the JLS [[JLS 2005]], §4.12.2.1, "Heap Pollution,"
Note that this does not imply that heap pollution only occurs if an unchecked warning actually occurred. It is possible to run a program where some of the binaries were compiled by a compiler for an older version of the Java programming language, or by a compiler that allows the unchecked warnings to suppressed [sic]. This practice is unhealthy at best.
Extending legacy classes and generifying the overriding methods fails because this is disallowed by the Java Language Specification [[JLS 2005]].
Noncompliant Code Example
This noncompliant code example compiles although it produces an unchecked warning because the raw type of the List.add()
method is used (the list
parameter in the addToList()
method) rather than the parameterized type.
class MixedTypes { private static void addToList(List list, Object obj) { list.add(obj); // unchecked warning } public static void main(String[] args) { List<String> list = new ArrayList<String> (); addToList(list, 1); System.out.println(list.get(0)); } }
When executed, this code produces an exception not because a List<String>
receives an Integer
but because the value returned by list.get(0)
is an improper type. In other words, the code throws an exception some time after execution of the operation that actually caused the exception, complicating debugging.
Compliant Solution (Parameterized Collection)
This compliant solution enforces type safety by changing the addToList()
method signature to enforce proper type checking. It also complies by adding a String
rather than an Integer
.
class Parameterized { private static void addToList(List<String> list, String str) { list.add(str); // No warning generated } public static void main(String[] args) { List<String> list = new ArrayList<String> (); addToList(list, "1"); System.out.println(list.get(0)); } }
The compiler does not allow insertion of an Object
once list
is parameterized. Likewise, addToList()
cannot be called with an argument whose type produces a mismatch.
Compliant Solution (Legacy Code)
While the previous compliant solution eliminates use of raw collections, this could be infeasible when interoperating with legacy code.
Suppose that the addToList()
method was legacy code that could not be changed. The following compliant solution creates a checked view of the list by using the Collections.checkedList()
method. This method returns a wrapper collection that performs runtime type checking in its implementation of the add()
method before delegating to the backend List<String>
. The wrapper collection can be safely passed to the legacy addToList()
method.
class MixedTypes { private static void addToList(List list, Object obj) { list.add(obj); // Unchecked warning } public static void main(String[] args) { List<String> list = new ArrayList<String> (); List<String> checkedList = Collections.checkedList(list, String.class); addToList(checkedList, 1); System.out.println(list.get(0)); } }
The compiler still issues the "unchecked warning," which may still be ignored. However, the code now fails precisely when it attempts to add the Integer
to the list, consequently preventing the program from proceeding with invalid data.
Noncompliant Code Example
This noncompliant code example compiles and runs cleanly because it suppresses the unchecked warning produced by the raw List.add()
method. The printOne()
method intends to print the value one, either as an int
or as a double
depending on the type of the variable type
.
class ListAdder { @SuppressWarnings("unchecked") private static void addToList(List list, Object obj) { list.add(obj); // Unchecked warning } private static <T> void printOne(T type) { if (!(type instanceof Integer || type instanceof Double)) { System.out.println("Cannot print in the supplied type"); } List<T> list = new ArrayList<T>(); addToList(list, 1); System.out.println(list.get(0)); } public static void main(String[] args) { double d = 1; int i = 1; System.out.println(d); ListAdder.printOne(d); System.out.println(i); ListAdder.printOne(i); } }
However, despite list
being correctly parameterized, this method prints '1' and never '1.0' because the int
value '1' is always added to list
without being type checked. This code produces the following output:
1.0 1 1 1
Compliant Solution
This compliant solution generifies the addToList()
method, which eliminates any possible type violations.
class ListAdder { private static <T> void addToList(List<T> list, T t) { list.add(t); // No warning generated } private static <T> void printOne(T type) { if (type instanceof Integer) { List<Integer> list = new ArrayList<Integer>(); addToList(list, 1); System.out.println(list.get(0)); } else if (type instanceof Double) { List<Double> list = new ArrayList<Double>(); // This will not compile if addToList(list, 1) is used addToList(list, 1.0); System.out.println(list.get(0)); } else { System.out.println("Cannot print in the supplied type"); } } public static void main(String[] args) { double d = 1; int i = 1; System.out.println(d); ListAdder.printOne(d); System.out.println(i); ListAdder.printOne(i); } }
This code compiles cleanly and produces the correct output:
1.0 1.0 1 1
If the method addToList()
is externally defined (such as in a library or as an upcall method) and cannot be changed, the same compliant method printOne()
can be used, but no warnings result if addToList(1)
is used instead of addToList(1.0)
. Great care must be taken to ensure type safety when generics are mixed with non-generic code.
Exceptions
OBJ03-EX0 Raw types must be used in class literals. For example, because List<Integer>.class
is illegal, it is permissible to use the raw type List.class
[[Bloch 2008]].
OBJ03-EX1 The instanceof
operator cannot be used with generic types. It is permissible to mix generic and raw code in such cases [[Bloch 2008]].
if(o instanceof Set) { // Raw type Set<?> m = (Set<?>) o; // Wildcard type // ... }
Risk Assessment
Mixing generic and non-generic code can produce unexpected results and exceptional conditions.
Rule |
Severity |
Likelihood |
Remediation Cost |
Priority |
Level |
---|---|---|---|---|---|
OBJ03-J |
low |
probable |
medium |
P4 |
L3 |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="a2aa2280-1bcb-4815-9bee-a6e00751a0ed"><ac:plain-text-body><![CDATA[ |
[[Bloch 2008 |
AA. Bibliography#Bloch 08]] |
Item 23: "Don't use raw types in new code" |
]]></ac:plain-text-body></ac:structured-macro> |
|
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="d8c79606-1b1d-4630-87b1-119d3e40bd48"><ac:plain-text-body><![CDATA[ |
[[Bloch 2007 |
AA. Bibliography#Bloch 07]] |
Generics, 1. "Avoid Raw Types in New Code" |
]]></ac:plain-text-body></ac:structured-macro> |
|
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e7a8668b-da10-4772-80f8-dba85737bc41"><ac:plain-text-body><![CDATA[ |
[[Bloch 2005 |
AA. Bibliography#Bloch 05]] |
Puzzle 88: Raw Deal |
]]></ac:plain-text-body></ac:structured-macro> |
|
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="bdb6e6a1-b20c-494e-ac31-c23b998dfe4a"><ac:plain-text-body><![CDATA[ |
[[Darwin 2004 |
AA. Bibliography#Darwin 04]] |
8.3 Avoid Casting by Using Generics |
]]></ac:plain-text-body></ac:structured-macro> |
|
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="f9eddd2a-a9e0-459c-8392-ba6feb89b0b8"><ac:plain-text-body><![CDATA[ |
[[JavaGenerics 2004 |
AA. Bibliography#JavaGenerics 04]] |
|
]]></ac:plain-text-body></ac:structured-macro> |
|
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="5c2e2953-fb12-4af3-8a46-f98a95d30d86"><ac:plain-text-body><![CDATA[ |
[[JLS 2005 |
AA. Bibliography#JLS 05]] |
[Chapter 5 "Conversions and Promotions" |
http://java.sun.com/docs/books/jls/third_edition/html/conversions.html] |
]]></ac:plain-text-body></ac:structured-macro> |
|
|||||
|
|||||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="bbc9d103-675f-4985-9957-657e3decac75"><ac:plain-text-body><![CDATA[ |
[[Langer 2008 |
AA. Bibliography#Langer 08]] |
Topic 3, "[Coping with Legacy |
http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html#Topic3]" |
]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="7fee0ade-2986-460a-9857-207e791dc056"><ac:plain-text-body><![CDATA[ |
[[Naftalin 2006 |
AA. Bibliography#Naftalin 06]] |
Chapter 8, "Effective Generics" |
]]></ac:plain-text-body></ac:structured-macro> |
|
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="45d5e233-a0da-4a45-bec3-aa73e22ad2e1"><ac:plain-text-body><![CDATA[ |
[[Naftalin 2006b |
AA. Bibliography#Naftalin 06b]] |
"Principle of Indecent Exposure" |
]]></ac:plain-text-body></ac:structured-macro> |
|
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="767be875-48af-4718-a3cf-a7f4221a50d3"><ac:plain-text-body><![CDATA[ |
[[Schildt 2007 |
AA. Bibliography#Schildt 07]] |
"Create a checked collection" |
]]></ac:plain-text-body></ac:structured-macro> |