public inbox for mauve-patches@sourceware.org
 help / color / mirror / Atom feed
* FYI: Throwpoint checks for java.net.ServerSocket
@ 2006-10-09 14:56 Gary Benson
  0 siblings, 0 replies; only message in thread
From: Gary Benson @ 2006-10-09 14:56 UTC (permalink / raw)
  To: mauve-patches

[-- Attachment #1: Type: text/plain, Size: 87 bytes --]

Hi again,

This commit adds throwpoint checks for java.net.ServerSocket.

Cheers,
Gary

[-- Attachment #2: patch --]
[-- Type: text/plain, Size: 6209 bytes --]

Index: ChangeLog
===================================================================
RCS file: /cvs/mauve/mauve/ChangeLog,v
retrieving revision 1.1947
diff -u -r1.1947 ChangeLog
--- ChangeLog	9 Oct 2006 13:35:47 -0000	1.1947
+++ ChangeLog	9 Oct 2006 14:53:57 -0000
@@ -1,3 +1,7 @@
+2006-10-09  Gary Benson  <gbenson@redhat.com>
+
+	* gnu/testlet/java/net/ServerSocket/security.java: New test.
+
 2006-10-09  Roman Kennke <kennke@aicas.com>
 
 	* gnu/testlet/javax/swing/JSplitPane/getDividerLocation.java,
Index: gnu/testlet/java/net/ServerSocket/security.java
===================================================================
RCS file: gnu/testlet/java/net/ServerSocket/security.java
diff -N gnu/testlet/java/net/ServerSocket/security.java
--- /dev/null	1 Jan 1970 00:00:00 -0000
+++ gnu/testlet/java/net/ServerSocket/security.java	9 Oct 2006 14:53:57 -0000
@@ -0,0 +1,183 @@
+// Copyright (C) 2006 Red Hat, Inc.
+// Written by Gary Benson <gbenson@redhat.com>
+
+// This file is part of Mauve.
+
+// Mauve is free software; you can redistribute it and/or modify
+// it under the terms of the GNU General Public License as published by
+// the Free Software Foundation; either version 2, or (at your option)
+// any later version.
+
+// Mauve is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU General Public License for more details.
+
+// You should have received a copy of the GNU General Public License
+// along with Mauve; see the file COPYING.  If not, write to
+// the Free Software Foundation, 59 Temple Place - Suite 330,
+// Boston, MA 02111-1307, USA.
+
+package gnu.testlet.java.net.ServerSocket;
+
+import java.net.InetAddress;
+import java.net.BindException;
+import java.net.ServerSocket;
+import java.net.Socket;
+import java.net.SocketPermission;
+import java.security.Permission;
+
+import gnu.testlet.Testlet;
+import gnu.testlet.TestHarness;
+import gnu.testlet.TestSecurityManager;
+
+public class security implements Testlet
+{
+  public void test(TestHarness harness)
+  {
+    try {
+      harness.checkPoint("setup");
+
+      InetAddress inetaddr = InetAddress.getByName(null);
+      String hostname = inetaddr.getHostName();
+      String hostaddr = inetaddr.getHostAddress();
+      harness.check(!hostname.equals(hostaddr));
+
+      ServerSocket ssocket = new ServerSocket(0, 50, inetaddr);
+      int sport = ssocket.getLocalPort();
+      Socket csocket = new Socket(inetaddr, sport, inetaddr, 0);
+      int cport = csocket.getLocalPort();
+      
+      Permission[] checkListen80 = new Permission[] {
+ 	new SocketPermission(hostname + ":80", "listen")};
+
+      Permission[] checkListen1024plus = new Permission[] {
+ 	new SocketPermission(hostname + ":1024-", "listen")};
+
+      Permission[] checkAccept = new Permission[] {
+ 	new SocketPermission(hostaddr + ":" + cport, "accept")};
+
+      Permission[] checkSelectorProvider = new Permission[] {
+	new RuntimePermission("selectorProvider")};
+
+      Permission[] checkSetFactory = new Permission[] {
+	new RuntimePermission("setFactory")};
+      
+      TestSecurityManager sm = new TestSecurityManager(harness);
+      try {
+	sm.install();
+
+	// throwpoint: java.net.ServerSocket-ServerSocket(int)
+	harness.checkPoint("ServerSocket(int)");
+	try {
+	  sm.prepareChecks(checkListen80, checkSelectorProvider);
+	  try {
+	    new ServerSocket(80).close();
+	  }
+	  catch (BindException e) {
+	  } 
+	  sm.checkAllChecked();
+	}
+	catch (SecurityException e) {
+	  harness.debug(e);
+	  harness.check(false, "unexpected check");
+	}
+	try {
+	  sm.prepareChecks(checkListen1024plus, checkSelectorProvider);
+	  new ServerSocket(0).close();
+	  sm.checkAllChecked();
+	}
+	catch (SecurityException e) {
+	  harness.debug(e);
+	  harness.check(false, "unexpected check");
+	}
+
+	// throwpoint: java.net.ServerSocket-ServerSocket(int, int)
+	harness.checkPoint("ServerSocket(int, int)");
+	try {
+	  sm.prepareChecks(checkListen80, checkSelectorProvider);
+	  try {
+	    new ServerSocket(80, 50).close();
+	  }
+	  catch (BindException e) {
+	  } 
+	  sm.checkAllChecked();
+	}
+	catch (SecurityException e) {
+	  harness.debug(e);
+	  harness.check(false, "unexpected check");
+	}
+	try {
+	  sm.prepareChecks(checkListen1024plus, checkSelectorProvider);
+	  new ServerSocket(0, 50).close();
+	  sm.checkAllChecked();
+	}
+	catch (SecurityException e) {
+	  harness.debug(e);
+	  harness.check(false, "unexpected check");
+	}
+
+	// throwpoint: java.net.ServerSocket-ServerSocket(int, int,InetAddress)
+	harness.checkPoint("ServerSocket(int, int, InetAddress)");
+	try {
+	  sm.prepareChecks(checkListen80, checkSelectorProvider);
+	  try {
+	    new ServerSocket(80, 50, inetaddr).close();
+	  }
+	  catch (BindException e) {
+	  } 
+	  sm.checkAllChecked();
+	}
+	catch (SecurityException e) {
+	  harness.debug(e);
+	  harness.check(false, "unexpected check");
+	}
+	try {
+	  sm.prepareChecks(checkListen1024plus, checkSelectorProvider);
+	  new ServerSocket(0, 50, inetaddr).close();
+	  sm.checkAllChecked();
+	}
+	catch (SecurityException e) {
+	  harness.debug(e);
+	  harness.check(false, "unexpected check");
+	}
+
+	// throwpoint: java.net.ServerSocket-accept
+	harness.checkPoint("accept");
+	try {
+	  sm.prepareChecks(checkAccept, checkSelectorProvider);
+	  ssocket.accept().close();
+	  sm.checkAllChecked();
+	}
+	catch (SecurityException e) {
+	  harness.debug(e);
+	  harness.check(false, "unexpected check");
+	}
+
+	// throwpoint: java.net.ServerSocket-setSocketFactory
+	harness.checkPoint("setSocketFactory");
+	try {
+	  sm.prepareHaltingChecks(checkSetFactory);
+	  ServerSocket.setSocketFactory(null);
+	  harness.check(false); 
+	}
+	catch (TestSecurityManager.SuccessException ex) {
+	  harness.check(true);
+	} 
+	catch (SecurityException ex) {
+	  harness.debug(ex);
+	  harness.check(false, "unexpected check");
+	}
+      }
+      finally {
+	sm.uninstall();
+	csocket.close();
+	ssocket.close();
+      }
+    }
+    catch (Exception e) {
+      harness.debug(e);
+      harness.check(false, "Unexpected exception");
+    }
+  }
+}

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2006-10-09 14:56 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-10-09 14:56 FYI: Throwpoint checks for java.net.ServerSocket Gary Benson

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).