* FYI: Throwpoint checks for java.net.ServerSocket
@ 2006-10-09 14:56 Gary Benson
0 siblings, 0 replies; only message in thread
From: Gary Benson @ 2006-10-09 14:56 UTC (permalink / raw)
To: mauve-patches
[-- Attachment #1: Type: text/plain, Size: 87 bytes --]
Hi again,
This commit adds throwpoint checks for java.net.ServerSocket.
Cheers,
Gary
[-- Attachment #2: patch --]
[-- Type: text/plain, Size: 6209 bytes --]
Index: ChangeLog
===================================================================
RCS file: /cvs/mauve/mauve/ChangeLog,v
retrieving revision 1.1947
diff -u -r1.1947 ChangeLog
--- ChangeLog 9 Oct 2006 13:35:47 -0000 1.1947
+++ ChangeLog 9 Oct 2006 14:53:57 -0000
@@ -1,3 +1,7 @@
+2006-10-09 Gary Benson <gbenson@redhat.com>
+
+ * gnu/testlet/java/net/ServerSocket/security.java: New test.
+
2006-10-09 Roman Kennke <kennke@aicas.com>
* gnu/testlet/javax/swing/JSplitPane/getDividerLocation.java,
Index: gnu/testlet/java/net/ServerSocket/security.java
===================================================================
RCS file: gnu/testlet/java/net/ServerSocket/security.java
diff -N gnu/testlet/java/net/ServerSocket/security.java
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ gnu/testlet/java/net/ServerSocket/security.java 9 Oct 2006 14:53:57 -0000
@@ -0,0 +1,183 @@
+// Copyright (C) 2006 Red Hat, Inc.
+// Written by Gary Benson <gbenson@redhat.com>
+
+// This file is part of Mauve.
+
+// Mauve is free software; you can redistribute it and/or modify
+// it under the terms of the GNU General Public License as published by
+// the Free Software Foundation; either version 2, or (at your option)
+// any later version.
+
+// Mauve is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+// GNU General Public License for more details.
+
+// You should have received a copy of the GNU General Public License
+// along with Mauve; see the file COPYING. If not, write to
+// the Free Software Foundation, 59 Temple Place - Suite 330,
+// Boston, MA 02111-1307, USA.
+
+package gnu.testlet.java.net.ServerSocket;
+
+import java.net.InetAddress;
+import java.net.BindException;
+import java.net.ServerSocket;
+import java.net.Socket;
+import java.net.SocketPermission;
+import java.security.Permission;
+
+import gnu.testlet.Testlet;
+import gnu.testlet.TestHarness;
+import gnu.testlet.TestSecurityManager;
+
+public class security implements Testlet
+{
+ public void test(TestHarness harness)
+ {
+ try {
+ harness.checkPoint("setup");
+
+ InetAddress inetaddr = InetAddress.getByName(null);
+ String hostname = inetaddr.getHostName();
+ String hostaddr = inetaddr.getHostAddress();
+ harness.check(!hostname.equals(hostaddr));
+
+ ServerSocket ssocket = new ServerSocket(0, 50, inetaddr);
+ int sport = ssocket.getLocalPort();
+ Socket csocket = new Socket(inetaddr, sport, inetaddr, 0);
+ int cport = csocket.getLocalPort();
+
+ Permission[] checkListen80 = new Permission[] {
+ new SocketPermission(hostname + ":80", "listen")};
+
+ Permission[] checkListen1024plus = new Permission[] {
+ new SocketPermission(hostname + ":1024-", "listen")};
+
+ Permission[] checkAccept = new Permission[] {
+ new SocketPermission(hostaddr + ":" + cport, "accept")};
+
+ Permission[] checkSelectorProvider = new Permission[] {
+ new RuntimePermission("selectorProvider")};
+
+ Permission[] checkSetFactory = new Permission[] {
+ new RuntimePermission("setFactory")};
+
+ TestSecurityManager sm = new TestSecurityManager(harness);
+ try {
+ sm.install();
+
+ // throwpoint: java.net.ServerSocket-ServerSocket(int)
+ harness.checkPoint("ServerSocket(int)");
+ try {
+ sm.prepareChecks(checkListen80, checkSelectorProvider);
+ try {
+ new ServerSocket(80).close();
+ }
+ catch (BindException e) {
+ }
+ sm.checkAllChecked();
+ }
+ catch (SecurityException e) {
+ harness.debug(e);
+ harness.check(false, "unexpected check");
+ }
+ try {
+ sm.prepareChecks(checkListen1024plus, checkSelectorProvider);
+ new ServerSocket(0).close();
+ sm.checkAllChecked();
+ }
+ catch (SecurityException e) {
+ harness.debug(e);
+ harness.check(false, "unexpected check");
+ }
+
+ // throwpoint: java.net.ServerSocket-ServerSocket(int, int)
+ harness.checkPoint("ServerSocket(int, int)");
+ try {
+ sm.prepareChecks(checkListen80, checkSelectorProvider);
+ try {
+ new ServerSocket(80, 50).close();
+ }
+ catch (BindException e) {
+ }
+ sm.checkAllChecked();
+ }
+ catch (SecurityException e) {
+ harness.debug(e);
+ harness.check(false, "unexpected check");
+ }
+ try {
+ sm.prepareChecks(checkListen1024plus, checkSelectorProvider);
+ new ServerSocket(0, 50).close();
+ sm.checkAllChecked();
+ }
+ catch (SecurityException e) {
+ harness.debug(e);
+ harness.check(false, "unexpected check");
+ }
+
+ // throwpoint: java.net.ServerSocket-ServerSocket(int, int,InetAddress)
+ harness.checkPoint("ServerSocket(int, int, InetAddress)");
+ try {
+ sm.prepareChecks(checkListen80, checkSelectorProvider);
+ try {
+ new ServerSocket(80, 50, inetaddr).close();
+ }
+ catch (BindException e) {
+ }
+ sm.checkAllChecked();
+ }
+ catch (SecurityException e) {
+ harness.debug(e);
+ harness.check(false, "unexpected check");
+ }
+ try {
+ sm.prepareChecks(checkListen1024plus, checkSelectorProvider);
+ new ServerSocket(0, 50, inetaddr).close();
+ sm.checkAllChecked();
+ }
+ catch (SecurityException e) {
+ harness.debug(e);
+ harness.check(false, "unexpected check");
+ }
+
+ // throwpoint: java.net.ServerSocket-accept
+ harness.checkPoint("accept");
+ try {
+ sm.prepareChecks(checkAccept, checkSelectorProvider);
+ ssocket.accept().close();
+ sm.checkAllChecked();
+ }
+ catch (SecurityException e) {
+ harness.debug(e);
+ harness.check(false, "unexpected check");
+ }
+
+ // throwpoint: java.net.ServerSocket-setSocketFactory
+ harness.checkPoint("setSocketFactory");
+ try {
+ sm.prepareHaltingChecks(checkSetFactory);
+ ServerSocket.setSocketFactory(null);
+ harness.check(false);
+ }
+ catch (TestSecurityManager.SuccessException ex) {
+ harness.check(true);
+ }
+ catch (SecurityException ex) {
+ harness.debug(ex);
+ harness.check(false, "unexpected check");
+ }
+ }
+ finally {
+ sm.uninstall();
+ csocket.close();
+ ssocket.close();
+ }
+ }
+ catch (Exception e) {
+ harness.debug(e);
+ harness.check(false, "Unexpected exception");
+ }
+ }
+}
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2006-10-09 14:56 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-10-09 14:56 FYI: Throwpoint checks for java.net.ServerSocket Gary Benson
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).