8291974: PrivateCredentialPermission should not use local variable to enable debugging
Reviewed-by: mullan
This commit is contained in:
parent
590de37bd7
commit
8480f87044
src/java.base/share/classes/javax/security/auth
test/jdk/javax/security/auth/PrivateCredentialPermission
@ -124,11 +124,6 @@ public final class PrivateCredentialPermission extends Permission {
|
||||
private Set<Principal> principals; // ignored - kept around for compatibility
|
||||
private transient CredOwner[] credOwners;
|
||||
|
||||
/**
|
||||
* @serial
|
||||
*/
|
||||
private final boolean testing = false;
|
||||
|
||||
/**
|
||||
* Create a new {@code PrivateCredentialPermission}
|
||||
* with the specified {@code credentialClass} and Principals.
|
||||
@ -317,13 +312,8 @@ public final class PrivateCredentialPermission extends Permission {
|
||||
String principalClass;
|
||||
String principalName;
|
||||
|
||||
if (testing)
|
||||
System.out.println("whole name = " + name);
|
||||
|
||||
// get the Credential Class
|
||||
credentialClass = tokenizer.nextToken();
|
||||
if (testing)
|
||||
System.out.println("Credential Class = " + credentialClass);
|
||||
|
||||
if (!tokenizer.hasMoreTokens()) {
|
||||
MessageFormat form = new MessageFormat(ResourcesMgr.getString
|
||||
@ -341,8 +331,6 @@ public final class PrivateCredentialPermission extends Permission {
|
||||
|
||||
// get the Principal Class
|
||||
principalClass = tokenizer.nextToken();
|
||||
if (testing)
|
||||
System.out.println(" Principal Class = " + principalClass);
|
||||
|
||||
if (!tokenizer.hasMoreTokens()) {
|
||||
MessageFormat form = new MessageFormat(ResourcesMgr.getString
|
||||
@ -391,9 +379,6 @@ public final class PrivateCredentialPermission extends Permission {
|
||||
}
|
||||
}
|
||||
|
||||
if (testing)
|
||||
System.out.println("\tprincipalName = '" + principalName + "'");
|
||||
|
||||
principalName = principalName.substring
|
||||
(1, principalName.length() - 1);
|
||||
|
||||
@ -403,9 +388,6 @@ public final class PrivateCredentialPermission extends Permission {
|
||||
("PrivateCredentialPermission.Principal.Class.can.not.be.a.wildcard.value.if.Principal.Name.is.not.a.wildcard.value"));
|
||||
}
|
||||
|
||||
if (testing)
|
||||
System.out.println("\tprincipalName = '" + principalName + "'");
|
||||
|
||||
pList.add(new CredOwner(principalClass, principalName));
|
||||
}
|
||||
|
||||
@ -419,10 +401,6 @@ public final class PrivateCredentialPermission extends Permission {
|
||||
if (thisC == null || thatC == null)
|
||||
return false;
|
||||
|
||||
if (testing)
|
||||
System.out.println("credential class comparison: " +
|
||||
thisC + "/" + thatC);
|
||||
|
||||
if (thisC.equals("*"))
|
||||
return true;
|
||||
|
||||
|
@ -0,0 +1,79 @@
|
||||
/*
|
||||
* Copyright (c) 2022, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||
* or visit www.oracle.com if you need additional information or have any
|
||||
* questions.
|
||||
*/
|
||||
|
||||
/*
|
||||
* @test
|
||||
* @bug 8291974
|
||||
* @summary PrivateCredentialPermission should not use local variable to enable debugging
|
||||
* implementation-dependent class
|
||||
*/
|
||||
|
||||
import javax.security.auth.*;
|
||||
import java.io.*;
|
||||
import java.util.*;
|
||||
|
||||
public class Serial2 {
|
||||
|
||||
/*
|
||||
* Base64 encoding of Serialized PrivateCredentialPermission object
|
||||
* before bug fix for JDK-8291974.
|
||||
*/
|
||||
static String before = """
|
||||
rO0ABXNyAC9qYXZheC5zZWN1cml0eS5hdXRoLlByaXZhdGVDcmVkZW50aWFsUGVybW\
|
||||
lzc2lvbklV3Hd7UH9MAgADWgAHdGVzdGluZ0wAD2NyZWRlbnRpYWxDbGFzc3QAEkxq\
|
||||
YXZhL2xhbmcvU3RyaW5nO0wACnByaW5jaXBhbHN0AA9MamF2YS91dGlsL1NldDt4cg\
|
||||
AYamF2YS5zZWN1cml0eS5QZXJtaXNzaW9uscbhPyhXUX4CAAFMAARuYW1lcQB+AAF4\
|
||||
cHQAGWNyZWQxIHBjMSAicG4xIiBwYzIgInBuMiIAdAAFY3JlZDFw\
|
||||
""";
|
||||
|
||||
public static void main(String[] args) {
|
||||
|
||||
byte[] decoded = Base64.getDecoder().decode(before);
|
||||
|
||||
try (
|
||||
// Decode Base64 string and turn it into an input stream.
|
||||
InputStream is = new ByteArrayInputStream(decoded);
|
||||
ObjectInputStream ois = new ObjectInputStream(is)
|
||||
) {
|
||||
// Deserialize input stream and create a new object.
|
||||
PrivateCredentialPermission pcp2 =
|
||||
(PrivateCredentialPermission)ois.readObject();
|
||||
PrivateCredentialPermission pcp =
|
||||
new PrivateCredentialPermission
|
||||
("cred1 pc1 \"pn1\" pc2 \"pn2\"", "read");
|
||||
/*
|
||||
* Compare deserialized object with current object.
|
||||
* This should always succeed. What is important is
|
||||
* that we get here without a deserialization exception.
|
||||
*/
|
||||
if (!pcp.equals(pcp2) || !pcp2.equals(pcp)) {
|
||||
throw new SecurityException("Serial2 test failed: " +
|
||||
"EQUALS TEST FAILED");
|
||||
}
|
||||
|
||||
System.out.println("Serial2 test succeeded");
|
||||
} catch (Exception e) {
|
||||
throw new SecurityException("Serial test failed", e);
|
||||
}
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user