72de24e59a
Reviewed-by: dfuchs
350 lines
13 KiB
Java
350 lines
13 KiB
Java
/*
|
|
* Copyright (c) 2020, 2023, Oracle and/or its affiliates. All rights reserved.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
* accompanied this code).
|
|
*
|
|
* You should have received a copy of the GNU General Public License version
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
* questions.
|
|
*/
|
|
|
|
/*
|
|
* @test
|
|
* @bug 8235459
|
|
* @summary Confirm that HttpRequest.BodyPublishers#ofFile(Path)
|
|
* works with changing permissions
|
|
* policy 1: no custom permission
|
|
* policy 2: custom permission for test classes
|
|
* policy 3: custom permission for test classes and httpclient
|
|
* @library /test/lib /test/jdk/java/net/httpclient/lib
|
|
* @build jdk.httpclient.test.lib.common.HttpServerAdapters jdk.test.lib.net.SimpleSSLContext
|
|
* SecureZipFSProvider
|
|
* @run testng/othervm/java.security.policy=FilePublisherPermsTest1.policy FilePublisherPermsTest
|
|
* @run testng/othervm/java.security.policy=FilePublisherPermsTest2.policy FilePublisherPermsTest
|
|
* @run testng/othervm/java.security.policy=FilePublisherPermsTest3.policy FilePublisherPermsTest
|
|
*/
|
|
|
|
import com.sun.net.httpserver.HttpServer;
|
|
import com.sun.net.httpserver.HttpsConfigurator;
|
|
import com.sun.net.httpserver.HttpsServer;
|
|
import jdk.test.lib.net.SimpleSSLContext;
|
|
import org.testng.annotations.AfterTest;
|
|
import org.testng.annotations.BeforeTest;
|
|
import org.testng.annotations.DataProvider;
|
|
import org.testng.annotations.Test;
|
|
|
|
import javax.net.ssl.SSLContext;
|
|
import java.io.FileNotFoundException;
|
|
import java.io.FilePermission;
|
|
import java.io.IOException;
|
|
import java.io.InputStream;
|
|
import java.io.OutputStream;
|
|
import java.net.InetAddress;
|
|
import java.net.InetSocketAddress;
|
|
import java.net.URI;
|
|
import java.net.http.HttpClient;
|
|
import java.net.http.HttpRequest;
|
|
import java.net.http.HttpRequest.BodyPublisher;
|
|
import java.net.http.HttpRequest.BodyPublishers;
|
|
import java.net.http.HttpResponse;
|
|
import java.nio.file.FileSystem;
|
|
import java.nio.file.FileSystems;
|
|
import java.nio.file.Files;
|
|
import java.nio.file.Path;
|
|
import java.security.*;
|
|
import java.util.Map;
|
|
import jdk.httpclient.test.lib.common.HttpServerAdapters;
|
|
import jdk.httpclient.test.lib.http2.Http2TestServer;
|
|
|
|
import static java.lang.System.out;
|
|
import static java.net.http.HttpClient.Builder.NO_PROXY;
|
|
import static java.net.http.HttpClient.Version.HTTP_1_1;
|
|
import static java.net.http.HttpClient.Version.HTTP_2;
|
|
import static org.testng.Assert.assertEquals;
|
|
import static org.testng.Assert.fail;
|
|
|
|
public class FilePublisherPermsTest implements HttpServerAdapters {
|
|
|
|
SSLContext sslContext;
|
|
HttpServerAdapters.HttpTestServer httpTestServer; // HTTP/1.1 [ 4 servers ]
|
|
HttpServerAdapters.HttpTestServer httpsTestServer; // HTTPS/1.1
|
|
HttpServerAdapters.HttpTestServer http2TestServer; // HTTP/2 ( h2c )
|
|
HttpServerAdapters.HttpTestServer https2TestServer; // HTTP/2 ( h2 )
|
|
String httpURI;
|
|
String httpsURI;
|
|
String http2URI;
|
|
String https2URI;
|
|
|
|
FileSystem zipFs;
|
|
static Path zipFsPath;
|
|
static Path defaultFsPath;
|
|
|
|
String policyFile;
|
|
|
|
// Default file system set up
|
|
static final String DEFAULT_FS_MSG = "default fs";
|
|
|
|
private Path defaultFsFile() throws Exception {
|
|
var file = Path.of("defaultFile.txt");
|
|
if (Files.notExists(file)) {
|
|
Files.createFile(file);
|
|
Files.writeString(file, DEFAULT_FS_MSG);
|
|
}
|
|
assertEquals(Files.readString(file), DEFAULT_FS_MSG);
|
|
return file;
|
|
}
|
|
|
|
@DataProvider(name = "defaultFsData")
|
|
public Object[][] defaultFsData() {
|
|
return new Object[][]{
|
|
{ httpURI, defaultFsPath },
|
|
{ httpsURI, defaultFsPath },
|
|
{ http2URI, defaultFsPath },
|
|
{ https2URI, defaultFsPath },
|
|
{ httpURI, defaultFsPath },
|
|
{ httpsURI, defaultFsPath },
|
|
{ http2URI, defaultFsPath },
|
|
{ https2URI, defaultFsPath },
|
|
};
|
|
}
|
|
|
|
@Test(dataProvider = "defaultFsData")
|
|
public void testDefaultFs(String uriString, Path path)
|
|
throws Exception {
|
|
out.printf("\n\n--- testDefaultFs(%s, %s): starting\n",
|
|
uriString, path);
|
|
|
|
if (System.getSecurityManager() != null) {
|
|
changePerms(path.toString(), "read,write,delete");
|
|
// Should not throw
|
|
BodyPublisher bodyPublisher = BodyPublishers.ofFile(path);
|
|
// Restrict permissions
|
|
changePerms(path.toString(), "delete");
|
|
try {
|
|
BodyPublishers.ofFile(path);
|
|
fail();
|
|
} catch (SecurityException e) {
|
|
out.println("Caught expected: " + e);
|
|
}
|
|
try {
|
|
send(uriString, bodyPublisher);
|
|
fail();
|
|
} catch (SecurityException e) {
|
|
out.println("Caught expected: " + e);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Zip File system set up
|
|
static final String ZIP_FS_MSG = "zip fs";
|
|
|
|
static FileSystem newZipFs(Path zipFile) throws Exception {
|
|
return FileSystems.newFileSystem(zipFile, Map.of("create", "true"));
|
|
}
|
|
|
|
static FileSystem newSecureZipFs(Path zipFile) throws Exception {
|
|
FileSystem fs = newZipFs(zipFile);
|
|
return new SecureZipFSProvider(fs.provider()).newFileSystem(fs);
|
|
}
|
|
|
|
static Path zipFsFile(FileSystem fs) throws Exception {
|
|
var file = fs.getPath("fileInZip.txt");
|
|
if (Files.notExists(file)) {
|
|
Files.createFile(file);
|
|
Files.writeString(file, ZIP_FS_MSG);
|
|
}
|
|
assertEquals(Files.readString(file), ZIP_FS_MSG);
|
|
return file;
|
|
}
|
|
|
|
@DataProvider(name = "zipFsData")
|
|
public Object[][] zipFsData() {
|
|
return new Object[][]{
|
|
{ httpURI, zipFsPath },
|
|
{ httpsURI, zipFsPath },
|
|
{ http2URI, zipFsPath },
|
|
{ https2URI, zipFsPath },
|
|
{ httpURI, zipFsPath },
|
|
{ httpsURI, zipFsPath },
|
|
{ http2URI, zipFsPath },
|
|
{ https2URI, zipFsPath },
|
|
};
|
|
}
|
|
|
|
@Test(dataProvider = "zipFsData")
|
|
public void testZipFs(String uriString, Path path) throws Exception {
|
|
out.printf("\n\n--- testZipFsCustomPerm(%s, %s): starting\n", uriString, path);
|
|
if (System.getSecurityManager() != null) {
|
|
changePerms(path.toString(), "read,write,delete");
|
|
|
|
// Custom permission not sufficiently granted, expected to fail
|
|
if (!policyFile.contains("FilePublisherPermsTest3")) {
|
|
try {
|
|
BodyPublishers.ofFile(path);
|
|
fail();
|
|
} catch (SecurityException e) {
|
|
out.println("Caught expected: " + e);
|
|
return;
|
|
}
|
|
} else {
|
|
BodyPublisher bodyPublisher = BodyPublishers.ofFile(path);
|
|
send(uriString, bodyPublisher);
|
|
// Restrict permissions
|
|
changePerms(path.toString(), "delete");
|
|
try {
|
|
BodyPublishers.ofFile(path);
|
|
fail();
|
|
} catch (SecurityException e) {
|
|
out.println("Caught expected: " + e);
|
|
}
|
|
try {
|
|
send(uriString, bodyPublisher);
|
|
fail();
|
|
} catch (SecurityException e) {
|
|
out.println("Caught expected: " + e);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testFileNotFound() throws Exception {
|
|
out.printf("\n\n--- testFileNotFound(): starting\n");
|
|
var zipPath = Path.of("fileNotFound.zip");
|
|
changePerms(zipPath.toString(), "read,write,delete");
|
|
try (FileSystem fs = newZipFs(zipPath)) {
|
|
Path fileInZip = zipFsFile(fs);
|
|
Files.deleteIfExists(fileInZip);
|
|
BodyPublishers.ofFile(fileInZip);
|
|
fail();
|
|
} catch (FileNotFoundException e) {
|
|
out.println("Caught expected: " + e);
|
|
}
|
|
var path = Path.of("fileNotFound.txt");
|
|
changePerms(path.toString(), "read,write,delete");
|
|
try {
|
|
Files.deleteIfExists(path);
|
|
BodyPublishers.ofFile(path);
|
|
fail();
|
|
} catch (FileNotFoundException e) {
|
|
out.println("Caught expected: " + e);
|
|
}
|
|
}
|
|
|
|
private void send(String uriString, BodyPublisher bodyPublisher)
|
|
throws Exception {
|
|
HttpClient client = HttpClient.newBuilder()
|
|
.proxy(NO_PROXY)
|
|
.sslContext(sslContext)
|
|
.build();
|
|
var req = HttpRequest.newBuilder(URI.create(uriString))
|
|
.POST(bodyPublisher)
|
|
.build();
|
|
client.send(req, HttpResponse.BodyHandlers.discarding());
|
|
}
|
|
|
|
private void changePerms(String path, String actions) {
|
|
Policy.setPolicy(new CustomPolicy(
|
|
new FilePermission(path, actions)
|
|
));
|
|
}
|
|
|
|
static class CustomPolicy extends Policy {
|
|
static final Policy DEFAULT_POLICY = Policy.getPolicy();
|
|
final PermissionCollection perms = new Permissions();
|
|
|
|
CustomPolicy(Permission... permissions) {
|
|
java.util.Arrays.stream(permissions).forEach(perms::add);
|
|
}
|
|
|
|
public PermissionCollection getPermissions(ProtectionDomain domain) {
|
|
return perms;
|
|
}
|
|
|
|
public PermissionCollection getPermissions(CodeSource codesource) {
|
|
return perms;
|
|
}
|
|
|
|
public boolean implies(ProtectionDomain domain, Permission perm) {
|
|
// Ignore any existing permissions for test files
|
|
return perm.getName().equals(defaultFsPath.toString())
|
|
|| perm.getName().equals(zipFsPath.toString())
|
|
? perms.implies(perm)
|
|
: perms.implies(perm) || DEFAULT_POLICY.implies(domain, perm);
|
|
}
|
|
}
|
|
|
|
static class HttpEchoHandler implements HttpServerAdapters.HttpTestHandler {
|
|
@Override
|
|
public void handle(HttpServerAdapters.HttpTestExchange t) throws IOException {
|
|
try (InputStream is = t.getRequestBody();
|
|
OutputStream os = t.getResponseBody()) {
|
|
byte[] bytes = is.readAllBytes();
|
|
t.sendResponseHeaders(200, bytes.length);
|
|
os.write(bytes);
|
|
}
|
|
}
|
|
}
|
|
|
|
@BeforeTest
|
|
public void setup() throws Exception {
|
|
policyFile = System.getProperty("java.security.policy");
|
|
out.println(policyFile);
|
|
|
|
sslContext = new SimpleSSLContext().get();
|
|
if (sslContext == null)
|
|
throw new AssertionError("Unexpected null sslContext");
|
|
|
|
zipFs = newSecureZipFs(Path.of("file.zip"));
|
|
zipFsPath = zipFsFile(zipFs);
|
|
defaultFsPath = defaultFsFile();
|
|
|
|
httpTestServer = HttpServerAdapters.HttpTestServer.create(HTTP_1_1);
|
|
httpTestServer.addHandler(
|
|
new FilePublisherPermsTest.HttpEchoHandler(), "/http1/echo");
|
|
httpURI = "http://" + httpTestServer.serverAuthority() + "/http1/echo";
|
|
|
|
httpsTestServer = HttpServerAdapters.HttpTestServer.create(HTTP_1_1, sslContext);
|
|
httpsTestServer.addHandler(
|
|
new FilePublisherPermsTest.HttpEchoHandler(), "/https1/echo");
|
|
httpsURI = "https://" + httpsTestServer.serverAuthority() + "/https1/echo";
|
|
|
|
http2TestServer = HttpServerAdapters.HttpTestServer.create(HTTP_2);
|
|
http2TestServer.addHandler(
|
|
new FilePublisherPermsTest.HttpEchoHandler(), "/http2/echo");
|
|
http2URI = "http://" + http2TestServer.serverAuthority() + "/http2/echo";
|
|
|
|
https2TestServer = HttpServerAdapters.HttpTestServer.create(HTTP_2, sslContext);
|
|
https2TestServer.addHandler(
|
|
new FilePublisherPermsTest.HttpEchoHandler(), "/https2/echo");
|
|
https2URI = "https://" + https2TestServer.serverAuthority() + "/https2/echo";
|
|
|
|
httpTestServer.start();
|
|
httpsTestServer.start();
|
|
http2TestServer.start();
|
|
https2TestServer.start();
|
|
}
|
|
|
|
@AfterTest
|
|
public void teardown() throws Exception {
|
|
httpTestServer.stop();
|
|
httpsTestServer.stop();
|
|
http2TestServer.stop();
|
|
https2TestServer.stop();
|
|
zipFs.close();
|
|
}
|
|
}
|