test/jdk/sun/security/tools/keytool/ImportPrompt.java
author weijun
Fri, 15 Nov 2019 09:06:58 +0800
changeset 59104 046e4024e55a
parent 47216 71c04702a3d5
permissions -rw-r--r--
8214024: Remove the default keytool -keyalg value Reviewed-by: mullan

/*
 * Copyright (c) 2017, 2019, Oracle and/or its affiliates. All rights reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * This code is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 only, as
 * published by the Free Software Foundation.
 *
 * This code is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * version 2 for more details (a copy is included in the LICENSE file that
 * accompanied this code).
 *
 * You should have received a copy of the GNU General Public License version
 * 2 along with this work; if not, write to the Free Software Foundation,
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 *
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
 * or visit www.oracle.com if you need additional information or have any
 * questions.
 */

import jdk.test.lib.Asserts;
import jdk.test.lib.SecurityTools;
import jdk.test.lib.process.OutputAnalyzer;

import java.io.File;
import java.security.KeyStore;

/**
 * @test
 * @bug 8172975
 * @summary SecurityTools.keytool() needs to accept user input
 * @library /test/lib
 * @build jdk.test.lib.SecurityTools
 *        jdk.test.lib.Utils
 *        jdk.test.lib.Asserts
 *        jdk.test.lib.JDKToolFinder
 *        jdk.test.lib.JDKToolLauncher
 *        jdk.test.lib.Platform
 *        jdk.test.lib.process.*
 * @run main ImportPrompt
 */

public class ImportPrompt {

    private static final String COMMON =
            "-storetype jks -storepass changeit -keypass changeit -debug";

    public static void main(String[] args) throws Throwable {

        kt("-keystore ks1 -genkeypair -keyalg DSA -alias a -dname CN=A");
        kt("-keystore ks1 -exportcert -alias a -file a.cert");

        // Just create a keystore
        kt("-keystore ks2 -genkeypair -keyalg DSA -alias b -dname CN=B");

        // no response text, assume no
        kt("-keystore ks2 -importcert -alias a -file a.cert");
        Asserts.assertFalse(hasA());

        // no reply is no
        SecurityTools.setResponse("no");
        kt("-keystore ks2 -importcert -alias a -file a.cert");
        Asserts.assertFalse(hasA());

        // explicit yes
        SecurityTools.setResponse("yes");
        kt("-keystore ks2 -importcert -alias a -file a.cert");
        Asserts.assertTrue(hasA());

        // remove it
        kt("-keystore ks2 -delete -alias a");
        Asserts.assertFalse(hasA());

        // the previous "yes" will not be remembered
        kt("-keystore ks2 -importcert -alias a -file a.cert");
        Asserts.assertFalse(hasA());

        // add with -noprompt
        SecurityTools.setResponse("");
        kt("-keystore ks2 -importcert -alias a -file a.cert -noprompt");
        Asserts.assertTrue(hasA());
    }

    private static OutputAnalyzer kt(String cmd) throws Throwable {
        return SecurityTools.keytool(COMMON + " " + cmd)
                .shouldHaveExitValue(0);
    }

    private static boolean hasA() throws Exception {
        return KeyStore.getInstance(new File("ks2"), "changeit".toCharArray())
                .containsAlias("a");
    }
}