blob: 3ead58127e6602cb875016b96399b1720269e094 [file] [log] [blame]
/*
* Copyright (c) 2016, 2017, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/*
* @test
* @bug 8164705 8168410
* @summary check compatibility after FilePermission change
* @library /java/security/testlibrary/
* @modules java.base/jdk.internal.misc
* @run main CompatImpact prepare
* @run main CompatImpact builtin
* @run main/othervm -Djdk.security.filePermCompat=true CompatImpact mine
* @run main/fail CompatImpact mine
* @run main CompatImpact dopriv
*/
import java.io.File;
import java.io.FilePermission;
import java.nio.file.Files;
import java.nio.file.Paths;
import java.security.AccessController;
import java.security.AllPermission;
import java.security.CodeSource;
import java.security.Permission;
import java.security.PermissionCollection;
import java.security.Policy;
import java.security.PrivilegedAction;
import java.security.ProtectionDomain;
import java.security.SecurityPermission;
public class CompatImpact {
public static void main(String[] args) throws Exception {
switch (args[0]) {
// copy class files to future classpath
case "prepare":
// cp in .
String cp = System.getProperty("test.classes");
Files.copy(Paths.get(cp, "CompatImpact.class"),
Paths.get("CompatImpact.class"));
Files.copy(Paths.get(cp, "CompatImpact$MP.class"),
Paths.get("CompatImpact$MP.class"));
Files.write(Paths.get("f"), new byte[10]);
// cp in ./sub
Files.createDirectory(Paths.get("sub"));
Files.copy(Paths.get(cp, "CompatImpact.class"),
Paths.get("sub", "CompatImpact.class"));
Files.copy(Paths.get(cp, "CompatImpact$MP.class"),
Paths.get("sub", "CompatImpact$MP.class"));
Files.write(Paths.get("sub", "f"), new byte[10]);
// cp in ./inner
Files.createDirectory(Paths.get("inner"));
Files.copy(Paths.get(cp, "CompatImpact$DoPrivInner.class"),
Paths.get("inner", "CompatImpact$DoPrivInner.class"));
break;
// default policy always covered, user-defined depends on
// system property jdk.security.filePermCompact.
case "builtin":
case "mine":
cp = System.getProperty("test.classes");
Proc p;
String failed = "";
String testcase = "";
String cwd = System.getProperty("user.dir");
// Granting a FilePermission on an absolute path
testcase = "PonA";
p = p(args[0], cwd + "/f")
.args("f", cwd + "/f")
.debug(testcase)
.start();
if (p.waitFor() != 0) {
Files.copy(Paths.get("stderr." + testcase), System.out);
failed += testcase + " ";
}
// Granting a FilePermission on a relative path
testcase = "PonR";
p = p(args[0], "f")
.args("f", cwd + "/f")
.debug(testcase)
.start();
if (p.waitFor() != 0) {
Files.copy(Paths.get("stderr." + testcase), System.out);
failed += testcase + " ";
}
// Reading file on classpath, not cwd
testcase = "cp";
String cprel = Paths.get(cwd).relativize(Paths.get(cp))
.normalize().toString();
p = p(args[0], "x")
.args(cp + "/f", cprel + "/f")
.debug(testcase)
.start();
if (p.waitFor() != 0) {
Files.copy(Paths.get("stderr." + testcase), System.out);
failed += testcase + " ";
}
// Reading file on classpath, cwd
testcase = "cpHere";
p = p(args[0], "x")
.args(cwd + "/f", "f", "RES")
.cp(".") // Must! cancel the old CLASSPATH.
.debug(testcase)
.start();
if (p.waitFor() != 0) {
Files.copy(Paths.get("stderr." + testcase), System.out);
failed += testcase + " ";
}
// Reading file on classpath, cwd
testcase = "cpSub";
p = p(args[0], "x")
.args(cwd + "/sub/f", "sub/f", "RES")
.cp("sub") // Must! There's CLASSPATH.
.debug(testcase)
.start();
if (p.waitFor() != 0) {
Files.copy(Paths.get("stderr." + testcase), System.out);
failed += testcase + " ";
}
if (!failed.isEmpty()) {
throw new Exception(failed + "failed");
}
break;
// test <policy_type> <grant> <read...>
case "test":
if (args[1].equals("mine")) {
Policy.setPolicy(new MP(args[2]));
}
Exception e = null;
for (int i = 3; i < args.length; i++) {
try {
System.out.println(args[i]);
if (args[i].equals("RES")) {
CompatImpact.class.getResourceAsStream("f")
.close();
} else {
new File(args[i]).exists();
}
} catch (Exception e2) {
e = e2;
e2.printStackTrace(System.out);
}
}
if (e != null) {
System.err.println("====================");
throw e;
}
break;
// doPrivWithPerm test launcher
case "dopriv":
cwd = System.getProperty("user.dir");
// caller (CompatImpact doprivouter, no permission) in sub,
// executor (DoPrivInner, AllPermission) in inner.
p = Proc.create("CompatImpact")
.args("doprivouter")
.prop("java.security.manager", "")
.grant(new File("inner"))
.perm(new AllPermission())
.cp("sub", "inner")
.debug("doPriv")
.args(cwd)
.start();
if (p.waitFor() != 0) {
throw new Exception("dopriv test fails");
}
break;
// doprivouter <cwd>
case "doprivouter":
DoPrivInner.main(args);
break;
default:
throw new Exception("unknown " + args[0]);
}
}
// Call by CompatImpact doprivouter, with AllPermission
public static class DoPrivInner {
public static void main(String[] args) throws Exception {
AccessController.doPrivileged((PrivilegedAction<Boolean>)
() -> new File("x").exists(),
null,
new FilePermission(args[1] + "/x", "read"));
AccessController.doPrivileged((PrivilegedAction<Boolean>)
() -> new File(args[1] + "/x").exists(),
null,
new FilePermission("x", "read"));
try {
AccessController.doPrivileged((PrivilegedAction<Boolean>)
() -> new File("x").exists(),
null,
new FilePermission("y", "read"));
throw new Exception("Should not read");
} catch (SecurityException se) {
// Expected
}
}
}
// Return a Proc object for different policy types
private static Proc p(String type, String f) throws Exception {
Proc p = Proc.create("CompatImpact")
.prop("java.security.manager", "")
.inheritProp("jdk.security.filePermCompat");
p.args("test", type);
switch (type) {
case "builtin":
// For builtin policy, reading access to f can be
// granted as a permission
p.perm(new FilePermission(f, "read"));
p.args("-");
break;
case "mine":
// For my policy, f is passed into test and new MP(f)
// will be set as new policy
p.perm(new SecurityPermission("setPolicy"));
p.args(f);
break;
default:
throw new Exception("unknown " + type);
}
return p;
}
// My own Policy impl, with only one granted permission, also not smart
// enough to know whether ProtectionDomain grants any permission
static class MP extends Policy {
final PermissionCollection pc;
MP(String f) {
FilePermission p = new FilePermission(f, "read");
pc = p.newPermissionCollection();
pc.add(p);
}
@Override
public PermissionCollection getPermissions(CodeSource codesource) {
return pc;
}
@Override
public PermissionCollection getPermissions(ProtectionDomain domain) {
return pc;
}
@Override
public boolean implies(ProtectionDomain domain, Permission permission) {
return pc.implies(permission);
}
}
}