test/jdk/java/net/SocketPermission/SocketPermissionCollection.java
author erikj
Tue, 12 Sep 2017 19:03:39 +0200
changeset 47216 71c04702a3d5
parent 31080 jdk/test/java/net/SocketPermission/SocketPermissionCollection.java@00a25f4c4d44
permissions -rw-r--r--
8187443: Forest Consolidation: Move files to unified layout Reviewed-by: darcy, ihse

/*
 * Copyright (c) 2015, Oracle and/or its affiliates. All rights reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * This code is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 only, as
 * published by the Free Software Foundation.
 *
 * This code is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * version 2 for more details (a copy is included in the LICENSE file that
 * accompanied this code).
 *
 * You should have received a copy of the GNU General Public License version
 * 2 along with this work; if not, write to the Free Software Foundation,
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 *
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
 * or visit www.oracle.com if you need additional information or have any
 * questions.
 */

/*
 * @test
 * @bug 8056179
 * @summary Unit test for PermissionCollection subclasses
 */

import java.net.SocketPermission;
import java.security.Permission;
import java.security.PermissionCollection;
import java.security.SecurityPermission;
import java.util.Enumeration;

public class SocketPermissionCollection {

    public static void main(String[] args) throws Exception {

        int testFail = 0;

        SocketPermission perm = new SocketPermission("www.example.com",
                                                     "connect");
        PermissionCollection perms = perm.newPermissionCollection();

        // test 1
        System.out.println
            ("test 1: add throws IllegalArgExc for wrong perm type");
        try {
            perms.add(new SecurityPermission("createAccessControlContext"));
            System.err.println("Expected IllegalArgumentException");
            testFail++;
        } catch (IllegalArgumentException iae) {}

        // test 2
        System.out.println("test 2: implies returns false for wrong perm type");
        if (perms.implies(new SecurityPermission("getPolicy"))) {
            System.err.println("Expected false, returned true");
            testFail++;
        }

        // test 3
        System.out.println
            ("test 3: implies returns true for match on name and action");
        perms.add(new SocketPermission("www.example.com", "connect"));
        if (!perms.implies(new SocketPermission("www.example.com", "connect"))) {
            System.err.println("Expected true, returned false");
            testFail++;
        }

        // test 4
        System.out.println
            ("test 4: implies returns false for match on name but not action");
        if (perms.implies(new SocketPermission("www.example.com", "accept"))) {
            System.err.println("Expected false, returned true");
            testFail++;
        }

        // test 5
        System.out.println("test 5: implies returns true for match on " +
                           "name and subset of actions");
        perms.add(new SocketPermission("www.example.org", "accept, connect"));
        if (!perms.implies(new SocketPermission("www.example.org", "connect"))) {
            System.err.println("Expected true, returned false");
            testFail++;
        }

        // test 6
        System.out.println("test 6: implies returns true for aggregate " +
                           "match on name and action");
        perms.add(new SocketPermission("www.example.us", "accept"));
        perms.add(new SocketPermission("www.example.us", "connect"));
        if (!perms.implies(new SocketPermission("www.example.us", "accept"))) {
            System.err.println("Expected true, returned false");
            testFail++;
        }
        if (!perms.implies(new SocketPermission("www.example.us",
                                                "connect,accept"))) {
            System.err.println("Expected true, returned false");
            testFail++;
        }

        // test 7
        System.out.println("test 7: implies returns true for wildcard " +
                           "and match on action");
        perms.add(new SocketPermission("*.example.edu", "resolve"));
        if (!perms.implies(new SocketPermission("foo.example.edu", "resolve"))) {
            System.err.println("Expected true, returned false");
            testFail++;
        }

        // test 8
        System.out.println("test 8: implies returns false for non-match " +
                           "on wildcard");
        if (perms.implies(new SocketPermission("foo.example.edu", "connect"))) {
            System.err.println("Expected false, returned true");
            testFail++;
        }

        // test 9
        System.out.println("test 9: implies returns true for matching " +
                           "port range and action");
        perms.add(new SocketPermission("204.160.241.0:1024-65535", "connect"));
        if (!perms.implies(new SocketPermission("204.160.241.0:1025", "connect"))) {
            System.err.println("Expected true, returned false");
            testFail++;
        }

        // test 13
        System.out.println("test 13: elements returns correct number of perms");
        int numPerms = 0;
        Enumeration<Permission> e = perms.elements();
        while (e.hasMoreElements()) {
            numPerms++;
            System.out.println(e.nextElement());
        }
        // the two "/tmp/baz" entries were combined into one
        if (numPerms != 5) {
            System.err.println("Expected 5, got " + numPerms);
            testFail++;
        }

        if (testFail > 0) {
            throw new Exception(testFail + " test(s) failed");
        }
    }
}