public inbox for mauve-patches@sourceware.org
 help / color / mirror / Atom feed
* FYI: Started anotating security manager tests
@ 2005-12-01 13:02 Gary Benson
  0 siblings, 0 replies; only message in thread
From: Gary Benson @ 2005-12-01 13:02 UTC (permalink / raw)
  To: mauve-patches

[-- Attachment #1: Type: text/plain, Size: 383 bytes --]

Hi,

I've started annotating what tests we have for the SecurityException
throwpoints listed in the 1.4.2 javadoc.  Presently the annotations
are comments, though I'm starting to think they should be in code
somewhere so the PASS/FAIL lines could highlight failing security-
sensitive tests.  But, I'll commit comments for now: I've spent enough
time thinking already!

Cheers,
Gary

[-- Attachment #2: patch --]
[-- Type: text/plain, Size: 6237 bytes --]

Index: ChangeLog
===================================================================
RCS file: /cvs/mauve/mauve/ChangeLog,v
retrieving revision 1.1267
diff -u -r1.1267 ChangeLog
--- ChangeLog	30 Nov 2005 22:46:29 -0000	1.1267
+++ ChangeLog	1 Dec 2005 12:39:09 -0000
@@ -1,3 +1,8 @@
+2005-12-01  Gary Benson <gbenson@redhat.com>
+
+	* gnu/testlet/java/io/File/security.java: Annotate
+	SecurityException throwpoint tests.
+
 2005-11-30  Anthony Balkissoon  <abalkiss@redhat.com>
 
 	* gnu/testlet/javax/swing/JFormattedTextField: New directory.
Index: gnu/testlet/java/io/File/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/File/security.java,v
retrieving revision 1.8
diff -u -r1.8 security.java
--- gnu/testlet/java/io/File/security.java	30 Nov 2005 13:46:25 -0000	1.8
+++ gnu/testlet/java/io/File/security.java	1 Dec 2005 12:39:09 -0000
@@ -93,6 +93,7 @@
     try {
       sm.install();
 	
+      // security: java.io.File-canWrite-DIR
       harness.checkPoint("dir.canWrite");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirWritePerm}, noPerms);
@@ -104,6 +105,7 @@
 	harness.check(false, "dir.canWrite - unexpected exception");
       }
 
+      // security: java.io.File-canRead-DIR
       harness.checkPoint("dir.canRead");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -115,6 +117,7 @@
 	harness.check(false, "dir.canRead - unexpected exception");
       }
 
+      // security: java.io.File-createNewFile
       harness.checkPoint("file.createNewFile");
       try {
 	sm.prepareChecks(new Permission[]{tmpfileWritePerm}, noPerms);
@@ -126,6 +129,7 @@
 	harness.check(false, "file.createNewFile - unexpected exception");
       }
 
+      // security: java.io.File-delete-FILE
       harness.checkPoint("file.delete");
       try {
 	sm.prepareChecks(new Permission[]{tmpfileDeletePerm}, noPerms);
@@ -137,6 +141,7 @@
 	harness.check(false, "file.delete - unexpected exception");
       }
 
+      // security: java.io.File-list(FilenameFilter)
       harness.checkPoint("dir.list(null)");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -148,6 +153,7 @@
 	harness.check(false, "dir.list(null) - unexpected exception");
       }
 
+      // security: java.io.File-list
       harness.checkPoint("dir.list()");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -159,6 +165,7 @@
 	harness.check(false, "dir.list() - unexpected exception");
       }
 
+      // security: java.io.File-listFiles
       harness.checkPoint("dir.listFiles()");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -170,6 +177,7 @@
 	harness.check(false, "dir.listFiles() - unexpected exception");
       }
 
+      // security: java.io.File-listFiles(FilenameFilter)
       harness.checkPoint("dir.listFiles(FilenameFilter)");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -182,6 +190,7 @@
 		      "dir.listFiles(FilenameFilter) - unexpected exception");
       }
 
+      // security: java.io.File-listFiles(FileFilter)
       harness.checkPoint("dir.listFiles(FileFilter)");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -194,6 +203,7 @@
 		      "dir.listFiles(FileFilter) - unexpected exception");
       }
 
+      // security: java.io.File-createTempFile(String, String)
       harness.checkPoint("createTempFile(2-args)");
       try {
 	sm.prepareChecks(new Permission[]{tmpallWritePerm},
@@ -206,6 +216,7 @@
 	harness.check(false, "createTempFile(2-args) - unexpected exception");
       }
 
+      // security: java.io.File-createTempFile(String, String, File)
       harness.checkPoint("createTempFile(3-args)");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirallWritePerm}, noPerms);
@@ -217,6 +228,7 @@
 	harness.check(false, "createTempFile(3-args) - unexpected exception");
       }
 
+      // security: java.io.File-setReadOnly-DIR
       harness.checkPoint("dir.setReadOnly");
       try {
 	sm.prepareChecks(new Permission[]{tmpdir2WritePerm}, noPerms);
@@ -228,6 +240,7 @@
 	harness.check(false, "dir.setReadOnly - unexpected exception");
       }
 
+      // security: java.io.File-delete-DIR
       // Make sure we remove the read only temp dir
       harness.checkPoint("dir.delete");
       try {
@@ -240,6 +253,7 @@
 	harness.check(false, "dir.delete - unexpected exception");
       }
       
+      // security: java.io.File-listRoots
       harness.checkPoint("listRoots()");
       try {
 	sm.prepareChecks(new Permission[]{rootReadPerm}, noPerms);
@@ -252,6 +266,7 @@
 	harness.check(false, "listRoots() - unexpected exception");
       }
 
+      // security: java.io.File-renameTo
       harness.checkPoint("file.renameTo");
       try {
 	sm.prepareChecks(new Permission[]{tmpfileWritePerm, 
@@ -265,6 +280,7 @@
 	harness.check(false, "file.renameTo - unexpected exception");
       }
 
+      // security: java.io.File-setLastModified-DIR
       harness.checkPoint("dir.setLastModified()");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirWritePerm}, noPerms);
@@ -276,6 +292,7 @@
 	harness.check(false, "dir.setLastModified() - unexpected exception");
       }
 
+      // security: java.io.File-deleteOnExit-DIR
       harness.checkPoint("dir.deleteOnExit()");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirDeletePerm}, noPerms);
@@ -286,6 +303,19 @@
 	harness.debug(ex);
 	harness.check(false, "dir.deleteOnExit() - unexpected exception");
       }
+
+      // security: TODO: java.io.File-deleteOnExit-FILE
+      // security: TODO: java.io.File-exists
+      // security: TODO: java.io.File-canRead-FILE
+      // security: TODO: java.io.File-isFile
+      // security: TODO: java.io.File-isDirectory
+      // security: TODO: java.io.File-isHidden
+      // security: TODO: java.io.File-lastModified
+      // security: TODO: java.io.File-length
+      // security: TODO: java.io.File-canWrite-FILE
+      // security: TODO: java.io.File-mkdir
+      // security: TODO: java.io.File-mkdirs
+      // security: TODO: java.io.File-setLastModified-FILE
     }
     catch (Throwable ex) {
       harness.debug(ex);

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2005-12-01 13:02 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2005-12-01 13:02 FYI: Started anotating security manager tests Gary Benson

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).