/* * Copyright (c) 2023, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ /* @test * @bug 8308678 * @requires (os.family == "mac") * @summary Verify UnixPath::toRealPath falls back if no perms on macOS * @run junit/othervm -Djava.security.manager=allow MacToRealPathWithSM */ import java.io.IOException; import java.nio.file.Files; import java.nio.file.LinkOption; import java.nio.file.Path; import org.junit.jupiter.api.BeforeAll; import org.junit.jupiter.params.ParameterizedTest; import org.junit.jupiter.params.provider.ValueSource; import static org.junit.jupiter.api.Assertions.assertDoesNotThrow; public class MacToRealPathWithSM { private static final String POLICY_FILE = "MacToRealPath.policy"; private static Path src; private static Path path; @BeforeAll public static void setup() throws IOException { String testSrc = System.getProperty("test.src"); String tmpDir = System.getProperty("java.io.tmpdir"); if (testSrc == null || tmpDir == null) throw new RuntimeException("This test must be run by jtreg"); System.out.printf("testSrc: %s%ntmpDir: %s%n", testSrc, tmpDir); src = Path.of(testSrc); Path tmp = Path.of(tmpDir); path = Files.createTempFile(tmp, "bonjour", ".txt"); path.toFile().deleteOnExit(); // Write to the path Files.writeString(path, "\nBonjour, tout le monde!\n"); System.out.println(Files.readString(path)); } @ParameterizedTest @ValueSource(strings = {"", POLICY_FILE}) @SuppressWarnings("removal") public void testToRealPath(String policyFile) throws IOException { // Install security manager with the given policy file if (!policyFile.isEmpty()) { System.setProperty("java.security.policy", src.resolve(policyFile).toString()); System.setSecurityManager(new SecurityManager()); } // Derive real path. Without the source change for this issue applied, // if a SecurityManager is used which does not grant read permission // for traversing "path" down from its root, an AccessContolException // is thrown by UnixPath::toRealPath assertDoesNotThrow(() -> System.out.printf("real path: %s%n", path.toRealPath()), "UnixPath::toRealPath() failed"); assertDoesNotThrow(() -> System.out.printf("real path no follow: %s%n", path.toRealPath(LinkOption.NOFOLLOW_LINKS)), "UnixPath::toRealPath(LinkOption.NOFOLLOW_LINKS) failed"); } }