1
0

Add unit tests to check behaviour when running in applet-like environments

with restrictive security managers.


git-svn-id: https://svn.apache.org/repos/asf/jakarta/commons/proper/logging/trunk@420478 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
Simon Kitching
2006-07-10 10:25:49 +00:00
parent ea5bc9e2a3
commit fc6da5291a
2 changed files with 174 additions and 0 deletions

View File

@@ -0,0 +1,85 @@
/*
* Copyright 2006 The Apache Software Foundation.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.commons.logging.security;
import java.io.FilePermission;
import java.security.Permission;
import java.util.PropertyPermission;
/**
* Custom implementation of a security manager, so we can control the
* security environment for tests in this package.
* <p>
* Note that we don't want to refuse permission to any junit method; otherwise
* any call to an assert will not be able to output its data!
*/
public class MockSecurityManager extends SecurityManager {
public void checkPermission(Permission p) throws SecurityException {
// System.out.println("\n\ntesting permission:" + p.getClass() + ":"+ p);
// allow read-only access to files, as this is needed to load classes!
if (p instanceof FilePermission) {
FilePermission fp = (FilePermission) p;
if (fp.getActions().equals("read")) {
return;
}
}
Exception e = new Exception();
e.fillInStackTrace();
StackTraceElement[] stack = e.getStackTrace();
boolean isControlled = false;
// start at 1 to skip the entry in the stack for this method
for(int i=1; i<stack.length; ++i) {
String mname = stack[i].getMethodName();
if (mname.equals("setSecurityManager")) {
// ok, allow this; we don't want to block any calls to setSecurityManager
// otherwise this custom security manager cannot be reset to the original
// one...
// System.out.println("Allow setSecurityManager");
return;
}
String cname = stack[i].getClassName();
//System.out.println("" + i + ":" + stack[i].getClassName() +
// "." + stack[i].getMethodName());
if (cname.startsWith("org.apache.commons.logging")) {
isControlled = true;
break;
}
}
if (!isControlled) {
// we have scanned the entire stack, and found no logging classes, so
// this must have been called from junit
// System.out.println("Not relevant to test; returning success");
return;
}
if (p instanceof PropertyPermission) {
// emulate an applet environment where system properties are not accessable
throw new SecurityException(
"Permission refused to access property:"
+ ((PropertyPermission)p).getName());
}
// emulate an environment where *everything* is refused
throw new SecurityException("Permission refused:" + p.getClass() + ":" + p);
}
}

View File

@@ -0,0 +1,89 @@
/*
* Copyright 2006 The Apache Software Foundation.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.commons.logging.security;
import java.io.PrintWriter;
import java.io.StringWriter;
import java.lang.reflect.Method;
import junit.framework.Test;
import junit.framework.TestCase;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.PathableClassLoader;
import org.apache.commons.logging.PathableTestSuite;
/**
* Tests for logging with a SecurityManager that forbids access to nearly everything.
* <p>
* Performing tests with security permissions disabled is tricky, as building error
* messages on failure requires certain security permissions. If the security manager
* blocks these, then the test can fail without the error messages being output.
*/
public class SecurityTestCase extends TestCase
{
private SecurityManager oldSecMgr;
/**
* Return the tests included in this test suite.
*/
public static Test suite() throws Exception {
PathableClassLoader parent = new PathableClassLoader(null);
parent.useSystemLoader("junit.");
parent.addLogicalLib("commons-logging");
parent.addLogicalLib("testclasses");
Class testClass = parent.loadClass(
"org.apache.commons.logging.security.SecurityTestCase");
return new PathableTestSuite(testClass, parent);
}
public void setUp() {
// save security manager so it can be restored in tearDown
oldSecMgr = System.getSecurityManager();
}
public void tearDown() {
// Restore, so other tests don't get stuffed up if a test
// sets a custom security manager.
System.setSecurityManager(oldSecMgr);
}
public void testSimple() {
SecurityManager mySecurityManager = new MockSecurityManager();
System.setSecurityManager(mySecurityManager);
try {
// Use reflection so that we can control exactly when the static
// initialiser for the LogFactory class is executed.
Class c = this.getClass().getClassLoader().loadClass(
"org.apache.commons.logging.LogFactory");
Method m = c.getMethod("getInstance", new Class[] {Class.class});
Log log = (Log) m.invoke(null, new Object[] {this.getClass()});
log.info("testing");
} catch(Throwable t) {
// Restore original security manager so output can be generated; the
// PrintWriter constructor tries to read the line.separator
// system property.
System.setSecurityManager(oldSecMgr);
StringWriter sw = new StringWriter();
PrintWriter pw = new PrintWriter(sw);
t.printStackTrace(pw);
fail("Unexpected exception:" + t.getMessage() + ":" + sw.toString());
}
}
}