blob: 637fb8e1f2ef64927228d623f282c2bbb640881f [file] [log] [blame]
/*
* Copyright (c) 2013, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/**
* @test
* @bug 8004476
* @summary test XPath extension functions
* @run main/othervm XPathExFuncTest
*/
// Android-changed: Added package & Test import
package test.javax.xml.jaxp.transform;
import org.testng.annotations.Test;
import java.io.FileInputStream;
import java.io.InputStream;
import java.security.AllPermission;
import java.security.CodeSource;
import java.security.Permission;
import java.security.PermissionCollection;
import java.security.Permissions;
import java.security.Policy;
import java.security.ProtectionDomain;
import java.util.Iterator;
import java.util.List;
import javax.xml.XMLConstants;
import javax.xml.namespace.NamespaceContext;
import javax.xml.namespace.QName;
import javax.xml.parsers.DocumentBuilder;
import javax.xml.parsers.DocumentBuilderFactory;
import javax.xml.xpath.XPath;
import javax.xml.xpath.XPathExpressionException;
import javax.xml.xpath.XPathFactory;
import javax.xml.xpath.XPathFactoryConfigurationException;
import javax.xml.xpath.XPathFunction;
import javax.xml.xpath.XPathFunctionException;
import javax.xml.xpath.XPathFunctionResolver;
import org.w3c.dom.Document;
/**
* test XPath extension functions
*
* @author huizhe.wang@oracle.com
*/
public class XPathExFuncTest extends TestBase {
final static String ENABLE_EXTENSION_FUNCTIONS = "http://www.oracle.com/xml/jaxp/properties/enableExtensionFunctions";
final static String CLASSNAME = "DocumentBuilderFactoryImpl";
final String XPATH_EXPRESSION = "ext:helloWorld()";
/**
* Creates a new instance of StreamReader
*/
public XPathExFuncTest(String name) {
super(name);
}
boolean hasSM;
// Android-changed: Load the files from java resources.
// String xslFile, xslFileId;
// String xmlFile, xmlFileId;
InputStream xmlStream;
protected void setUp() {
super.setUp();
// Android-changed: Load the files from java resources.
// xmlFile = filepath + "/SecureProcessingTest.xml";
xmlStream = XPathExFuncTest.class.getResourceAsStream("SecureProcessingTest.xml");
}
// Android-changed: Removed args & added @Test
@Test
public static void main() {
XPathExFuncTest test = new XPathExFuncTest("OneTest");
test.setUp();
test.testExtFunc();
// Android-removed: Android doesn't allow setting a SecurityManager.
// test.testExtFuncNotAllowed();
// Android-added: Call setUp() before each test
test.setUp();
test.testEnableExtFunc();
test.tearDown();
}
/**
* by default, extension function is enabled
*/
public void testExtFunc() {
try {
evaluate(false);
System.out.println("testExtFunc: OK");
} catch (XPathFactoryConfigurationException e) {
fail(e.getMessage());
} catch (XPathExpressionException e) {
fail(e.getMessage());
}
}
/**
* Security is enabled, extension function not allowed
*/
public void testExtFuncNotAllowed() {
Policy p = new SimplePolicy(new AllPermission());
Policy.setPolicy(p);
System.setSecurityManager(new SecurityManager());
try {
evaluate(false);
} catch (XPathFactoryConfigurationException e) {
fail(e.getMessage());
} catch (XPathExpressionException ex) {
//expected since extension function is disallowed
System.out.println("testExtFuncNotAllowed: OK");
} finally {
System.setSecurityManager(null);
}
}
/**
* Security is enabled, use new feature: enableExtensionFunctions
*/
public void testEnableExtFunc() {
// Android-removed: Android doesn't use SecurityManager.
// Policy p = new SimplePolicy(new AllPermission());
// Policy.setPolicy(p);
// System.setSecurityManager(new SecurityManager());
try {
evaluate(true);
System.out.println("testEnableExt: OK");
} catch (XPathFactoryConfigurationException e) {
fail(e.getMessage());
} catch (XPathExpressionException e) {
fail(e.getMessage());
} finally {
System.setSecurityManager(null);
}
}
Document getDocument() {
// the xml source
DocumentBuilderFactory documentBuilderFactory = DocumentBuilderFactory.newInstance();
DocumentBuilder documentBuilder = null;
Document document = null;
try {
documentBuilder = documentBuilderFactory.newDocumentBuilder();
// Android-changed: Load the xml file from java resources.
// InputStream xmlStream = new FileInputStream(xmlFile);
InputStream xmlStream = this.xmlStream; // new FileInputStream(xmlFile);
document = documentBuilder.parse(xmlStream);
} catch (Exception e) {
fail(e.toString());
}
return document;
}
void evaluate(boolean enableExt) throws XPathFactoryConfigurationException, XPathExpressionException {
Document document = getDocument();
XPathFactory xPathFactory = XPathFactory.newInstance();
/**
* Use of the extension function 'http://exslt.org/strings:tokenize' is
* not allowed when the secure processing feature is set to true.
* Attempt to use the new property to enable extension function
*/
if (enableExt) {
boolean isExtensionSupported = enableExtensionFunction(xPathFactory);
}
xPathFactory.setXPathFunctionResolver(new MyXPathFunctionResolver());
if (System.getSecurityManager() == null) {
xPathFactory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, false);
}
XPath xPath = xPathFactory.newXPath();
xPath.setNamespaceContext(new MyNamespaceContext());
String xPathResult = xPath.evaluate(XPATH_EXPRESSION, document);
System.out.println(
"XPath result (enableExtensionFunction == " + enableExt + ") = \""
+ xPathResult
+ "\"");
}
public class MyXPathFunctionResolver
implements XPathFunctionResolver {
public XPathFunction resolveFunction(QName functionName, int arity) {
// not a real ewsolver, always return a default XPathFunction
return new MyXPathFunction();
}
}
public class MyXPathFunction
implements XPathFunction {
public Object evaluate(List list) throws XPathFunctionException {
return "Hello World";
}
}
public class MyNamespaceContext implements NamespaceContext {
public String getNamespaceURI(String prefix) {
if (prefix == null) {
throw new IllegalArgumentException("The prefix cannot be null.");
}
if (prefix.equals("ext")) {
return "http://ext.com";
} else {
return null;
}
}
public String getPrefix(String namespace) {
if (namespace == null) {
throw new IllegalArgumentException("The namespace uri cannot be null.");
}
if (namespace.equals("http://ext.com")) {
return "ext";
} else {
return null;
}
}
public Iterator getPrefixes(String namespace) {
return null;
}
}
boolean enableExtensionFunction(XPathFactory factory) {
boolean isSupported = true;
try {
factory.setFeature(ENABLE_EXTENSION_FUNCTIONS, true);
} catch (XPathFactoryConfigurationException ex) {
isSupported = false;
}
return isSupported;
}
class SimplePolicy extends Policy {
private final Permissions perms;
public SimplePolicy(Permission... permissions) {
perms = new Permissions();
for (Permission permission : permissions) {
perms.add(permission);
}
}
@Override
public PermissionCollection getPermissions(CodeSource cs) {
return perms;
}
@Override
public PermissionCollection getPermissions(ProtectionDomain pd) {
return perms;
}
@Override
public boolean implies(ProtectionDomain pd, Permission p) {
return perms.implies(p);
}
//for older jdk
@Override
public void refresh() {
}
}
}