From f494f3ed4995adbf41b2678d60606080ceafb441 Mon Sep 17 00:00:00 2001 From: Janak Ramakrishnan Date: Mon, 14 Sep 2015 21:29:56 +0000 Subject: Hack serialization of Environment$Extension so that it deserializes, although not correctly. Attempts to use it will still most likely fail, but won't crash. -- MOS_MIGRATED_REVID=103029603 --- .../com/google/devtools/build/lib/syntax/Environment.java | 11 +++++++++++ 1 file changed, 11 insertions(+) (limited to 'src/main/java/com') diff --git a/src/main/java/com/google/devtools/build/lib/syntax/Environment.java b/src/main/java/com/google/devtools/build/lib/syntax/Environment.java index 1bfba3a5d7..89360a765a 100644 --- a/src/main/java/com/google/devtools/build/lib/syntax/Environment.java +++ b/src/main/java/com/google/devtools/build/lib/syntax/Environment.java @@ -230,6 +230,11 @@ public final class Environment implements Freezable { BaseExtension(Environment env) { this.bindings = ImmutableMap.copyOf(env.globalFrame.bindings); } + + // Hack to allow serialization. + BaseExtension() { + this.bindings = ImmutableMap.of(); + } } /** @@ -249,6 +254,12 @@ public final class Environment implements Freezable { this.transitiveContentHashCode = env.getTransitiveContentHashCode(); } + // Hack to allow serialization. + private Extension() { + super(); + this.transitiveContentHashCode = null; + } + @VisibleForTesting // This is only used in one test. public String getTransitiveContentHashCode() { return transitiveContentHashCode; -- cgit v1.2.3