blob: ba51e9dce460aea503f84f51ec14d4654a44c45f [file] [log] [blame]
joehw08a68c42012-04-17 11:21:35 -07001/*
coffeys55ddfb12013-06-06 14:10:44 +01002 * Copyright (c) 2012, 2013, Oracle and/or its affiliates. All rights reserved.
joehw08a68c42012-04-17 11:21:35 -07003 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4 *
5 * This code is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 only, as
7 * published by the Free Software Foundation.
8 *
9 * This code is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12 * version 2 for more details (a copy is included in the LICENSE file that
13 * accompanied this code).
14 *
15 * You should have received a copy of the GNU General Public License version
16 * 2 along with this work; if not, write to the Free Software Foundation,
17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18 *
19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20 * or visit www.oracle.com if you need additional information or have any
21 * questions.
22 */
23
24/*
coffeys52be22a2013-07-09 16:00:41 +010025 * @test
mullan40a8bb12013-08-27 12:04:32 -040026 * @bug 6741606 7146431 8000450 8019830
coffeys52be22a2013-07-09 16:00:41 +010027 * @summary Make sure all restricted packages listed in the package.access
28 * property in the java.security file are blocked
29 * @run main/othervm CheckPackageAccess
joehw08a68c42012-04-17 11:21:35 -070030 */
31
coffeys52be22a2013-07-09 16:00:41 +010032import java.security.Security;
33import java.util.Collections;
34import java.util.Arrays;
35import java.util.ArrayList;
36import java.util.List;
37import java.util.StringTokenizer;
38
39/*
40 * The main benefit of this test is to catch merge errors or other types
41 * of issues where one or more of the packages are accidentally
42 * removed. This is why the packages that are known to be restricted have to
43 * be explicitly listed below.
44 */
joehw08a68c42012-04-17 11:21:35 -070045public class CheckPackageAccess {
46
coffeys52be22a2013-07-09 16:00:41 +010047 /*
48 * This array should be updated whenever new packages are added to the
49 * package.access property in the java.security file
mullan8ee655c2013-10-17 10:18:44 -040050 * NOTE: it should be in the same order as the java.security file
coffeys52be22a2013-07-09 16:00:41 +010051 */
52 private static final String[] packages = {
53 "sun.",
coffeys52be22a2013-07-09 16:00:41 +010054 "com.sun.xml.internal.",
55 "com.sun.imageio.",
56 "com.sun.istack.internal.",
57 "com.sun.jmx.",
mullan40a8bb12013-08-27 12:04:32 -040058 "com.sun.media.sound.",
coffeys52be22a2013-07-09 16:00:41 +010059 "com.sun.proxy.",
60 "com.sun.org.apache.bcel.internal.",
61 "com.sun.org.apache.regexp.internal.",
62 "com.sun.org.apache.xerces.internal.",
63 "com.sun.org.apache.xpath.internal.",
64 "com.sun.org.apache.xalan.internal.extensions.",
65 "com.sun.org.apache.xalan.internal.lib.",
66 "com.sun.org.apache.xalan.internal.res.",
67 "com.sun.org.apache.xalan.internal.templates.",
68 "com.sun.org.apache.xalan.internal.utils.",
69 "com.sun.org.apache.xalan.internal.xslt.",
70 "com.sun.org.apache.xalan.internal.xsltc.cmdline.",
71 "com.sun.org.apache.xalan.internal.xsltc.compiler.",
72 "com.sun.org.apache.xalan.internal.xsltc.trax.",
73 "com.sun.org.apache.xalan.internal.xsltc.util.",
74 "com.sun.org.apache.xml.internal.res.",
75 "com.sun.org.apache.xml.internal.security.",
76 "com.sun.org.apache.xml.internal.serializer.utils.",
77 "com.sun.org.apache.xml.internal.utils.",
78 "com.sun.org.glassfish.",
79 "com.oracle.xmlns.internal.",
80 "com.oracle.webservices.internal.",
81 "oracle.jrockit.jfr.",
82 "org.jcp.xml.dsig.internal.",
83 "jdk.internal.",
84 "jdk.nashorn.internal.",
85 "jdk.nashorn.tools."
86 };
joehw08a68c42012-04-17 11:21:35 -070087
coffeys52be22a2013-07-09 16:00:41 +010088 public static void main(String[] args) throws Exception {
89 List<String> pkgs = new ArrayList<>(Arrays.asList(packages));
90 String osName = System.getProperty("os.name");
91 if (osName.contains("OS X")) {
92 pkgs.add("apple."); // add apple package for OS X
93 } else if (osName.startsWith("Windows")) {
94 pkgs.add("com.sun.java.accessibility.");
95 }
96
97 List<String> jspkgs =
98 getPackages(Security.getProperty("package.access"));
99
mullan8ee655c2013-10-17 10:18:44 -0400100 if (!isOpenJDKOnly()) {
101 String lastPkg = pkgs.get(pkgs.size() - 1);
102
mullan506b2d32013-10-11 08:43:07 -0400103 // Remove any closed packages from list before comparing
mullan8ee655c2013-10-17 10:18:44 -0400104 int index = jspkgs.indexOf(lastPkg);
105 if (index != -1 && index != jspkgs.size() - 1) {
106 jspkgs.subList(index + 1, jspkgs.size()).clear();
107 }
mullan506b2d32013-10-11 08:43:07 -0400108 }
109
coffeys52be22a2013-07-09 16:00:41 +0100110 // Sort to ensure lists are comparable
111 Collections.sort(pkgs);
112 Collections.sort(jspkgs);
113
114 if (!pkgs.equals(jspkgs)) {
115 for (String p : pkgs)
116 if (!jspkgs.contains(p))
117 System.out.println("In golden set, but not in j.s file: " + p);
118 for (String p : jspkgs)
119 if (!pkgs.contains(p))
120 System.out.println("In j.s file, but not in golden set: " + p);
121
122
123 throw new RuntimeException("restricted packages are not " +
124 "consistent with java.security file");
125 }
126 System.setSecurityManager(new SecurityManager());
127 SecurityManager sm = System.getSecurityManager();
128 for (String pkg : packages) {
129 String subpkg = pkg + "foo";
joehw08a68c42012-04-17 11:21:35 -0700130 try {
131 sm.checkPackageAccess(pkg);
coffeys52be22a2013-07-09 16:00:41 +0100132 throw new RuntimeException("Able to access " + pkg +
133 " package");
134 } catch (SecurityException se) { }
135 try {
136 sm.checkPackageAccess(subpkg);
137 throw new RuntimeException("Able to access " + subpkg +
138 " package");
coffeys55ddfb12013-06-06 14:10:44 +0100139 } catch (SecurityException se) { }
140 try {
141 sm.checkPackageDefinition(pkg);
coffeys52be22a2013-07-09 16:00:41 +0100142 throw new RuntimeException("Able to define class in " + pkg +
143 " package");
144 } catch (SecurityException se) { }
145 try {
146 sm.checkPackageDefinition(subpkg);
147 throw new RuntimeException("Able to define class in " + subpkg +
148 " package");
joehw08a68c42012-04-17 11:21:35 -0700149 } catch (SecurityException se) { }
150 }
coffeys52be22a2013-07-09 16:00:41 +0100151 System.out.println("Test passed");
152 }
153
154 private static List<String> getPackages(String p) {
155 List<String> packages = new ArrayList<>();
156 if (p != null && !p.equals("")) {
157 StringTokenizer tok = new StringTokenizer(p, ",");
158 while (tok.hasMoreElements()) {
159 String s = tok.nextToken().trim();
160 packages.add(s);
161 }
162 }
163 return packages;
joehw08a68c42012-04-17 11:21:35 -0700164 }
mullan8ee655c2013-10-17 10:18:44 -0400165
166 private static boolean isOpenJDKOnly() {
167 String prop = System.getProperty("java.runtime.name");
168 return prop != null && prop.startsWith("OpenJDK");
169 }
joehw08a68c42012-04-17 11:21:35 -0700170}