diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/SubjectDelegation2Test.java b/jdk/test/javax/management/remote/mandatory/subjectDelegation/SubjectDelegation2Test.java index c5553029d6f638e13962d03efb7b258003718c9d..4e03de3c10784c56c19bb1321fdf2a3b4f360d05 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/SubjectDelegation2Test.java +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/SubjectDelegation2Test.java @@ -1,5 +1,5 @@ /* - * Copyright (c) 2005, 2013, Oracle and/or its affiliates. All rights reserved. + * Copyright (c) 2005, 2017, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it @@ -44,7 +44,6 @@ import java.lang.management.ManagementFactory; import java.rmi.RemoteException; import java.rmi.registry.LocateRegistry; import java.rmi.registry.Registry; -import java.util.Collections; import java.util.HashMap; import java.util.Properties; import javax.management.Attribute; @@ -57,24 +56,11 @@ import javax.management.remote.JMXConnector; import javax.management.remote.JMXConnectorFactory; import javax.management.remote.JMXConnectorServer; import javax.management.remote.JMXConnectorServerFactory; -import javax.management.remote.JMXPrincipal; import javax.management.remote.JMXServiceURL; -import javax.security.auth.Subject; public class SubjectDelegation2Test { public static void main(String[] args) throws Exception { - // Check for supported operating systems: Solaris - // - // This test runs only on Solaris due to CR 6285916 - // - String osName = System.getProperty("os.name"); - System.out.println("os.name = " + osName); - if (!osName.equals("SunOS")) { - System.out.println("This test runs on Solaris only."); - System.out.println("Bye! Bye!"); - return; - } String policyFile = args[0]; String testResult = args[1]; System.out.println("Policy file = " + policyFile); @@ -137,9 +123,8 @@ public class SubjectDelegation2Test { // Create an RMI connector server // System.out.println("Create an RMI connector server"); - JMXServiceURL url = - new JMXServiceURL("rmi", null, 0, - "/jndi/rmi://:" + port + "/server" + port); + JMXServiceURL url = new JMXServiceURL("rmi", null, 0); + jmxcs = JMXConnectorServerFactory.newJMXConnectorServer(url, env, mbs); jmxcs.start(); @@ -151,7 +136,7 @@ public class SubjectDelegation2Test { // String[] credentials = new String[] { "monitorRole" , "QED" }; cli_env.put("jmx.remote.credentials", credentials); - jmxc = JMXConnectorFactory.connect(url, cli_env); + jmxc = JMXConnectorFactory.connect(jmxcs.getAddress(), cli_env); MBeanServerConnection mbsc = jmxc.getMBeanServerConnection(); // Get domains from MBeanServer // diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/SubjectDelegation3Test.java b/jdk/test/javax/management/remote/mandatory/subjectDelegation/SubjectDelegation3Test.java index 27479d1c6dbd8409bc356b011d5c0fafd5ac3573..b999c9ebdf5501443a0c7e4f41f8f5a1671e6711 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/SubjectDelegation3Test.java +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/SubjectDelegation3Test.java @@ -1,5 +1,5 @@ /* - * Copyright (c) 2005, 2013, Oracle and/or its affiliates. All rights reserved. + * Copyright (c) 2005, 2017, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it @@ -65,17 +65,6 @@ import javax.security.auth.Subject; public class SubjectDelegation3Test { public static void main(String[] args) throws Exception { - // Check for supported operating systems: Solaris - // - // This test runs only on Solaris due to CR 6285916 - // - String osName = System.getProperty("os.name"); - System.out.println("os.name = " + osName); - if (!osName.equals("SunOS")) { - System.out.println("This test runs on Solaris only."); - System.out.println("Bye! Bye!"); - return; - } String policyFile = args[0]; String testResult = args[1]; System.out.println("Policy file = " + policyFile); @@ -139,8 +128,7 @@ public class SubjectDelegation3Test { // System.out.println("Create an RMI connector server"); JMXServiceURL url = - new JMXServiceURL("rmi", null, 0, - "/jndi/rmi://:" + port + "/server" + port); + new JMXServiceURL("rmi", null, 0); jmxcs = JMXConnectorServerFactory.newJMXConnectorServer(url, env, mbs); jmxcs.start(); @@ -152,7 +140,7 @@ public class SubjectDelegation3Test { // String[] credentials = new String[] { "monitorRole" , "QED" }; cli_env.put("jmx.remote.credentials", credentials); - jmxc = JMXConnectorFactory.connect(url, cli_env); + jmxc = JMXConnectorFactory.connect(jmxcs.getAddress(), cli_env); Subject delegationSubject = new Subject(true, Collections.singleton(new JMXPrincipal("delegate")), diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy21 b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy21 index 4b83e5fb49611a063915d8a257adab4192aabd2c..5419fa20aec036e951f8b5fe6d75e5a36e9bc2ce 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy21 +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy21 @@ -2,6 +2,7 @@ grant codebase "file:/-" { permission javax.security.auth.AuthPermission "createLoginContext.JMXPluggableAuthenticator"; permission java.net.SocketPermission "*:*", "accept,connect,listen,resolve"; permission java.security.SecurityPermission "createAccessControlContext"; + permission java.lang.RuntimePermission "*"; permission javax.management.MBeanPermission "*", "getDomains"; permission javax.management.MBeanPermission "SimpleStandard#State[MBeans:type=SimpleStandard]", "getAttribute"; permission javax.security.auth.AuthPermission "getSubject"; diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy22 b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy22 index 7db427794b881768952bfde16ea19f5b2955b297..87d39c80db9c6061433f1fdfa0c5610bc8c7fd85 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy22 +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy22 @@ -1,6 +1,7 @@ grant codebase "file:/-" { permission javax.security.auth.AuthPermission "createLoginContext.JMXPluggableAuthenticator"; permission java.net.SocketPermission "*:*", "accept,connect,listen,resolve"; + permission java.lang.RuntimePermission "*"; permission java.security.SecurityPermission "createAccessControlContext"; // permission javax.management.MBeanPermission "*", "getDomains"; permission javax.management.MBeanPermission "SimpleStandard#State[MBeans:type=SimpleStandard]", "getAttribute"; diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy23 b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy23 index 4a92cb56b6c980ffbae39a63c3e77fc2a3c6ca18..584cb479d4f84224e941856dc028518567f16b83 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy23 +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy23 @@ -1,6 +1,7 @@ grant codebase "file:/-" { permission javax.security.auth.AuthPermission "createLoginContext.JMXPluggableAuthenticator"; permission java.net.SocketPermission "*:*", "accept,connect,listen,resolve"; + permission java.lang.RuntimePermission "*"; permission java.security.SecurityPermission "createAccessControlContext"; permission javax.management.MBeanPermission "*", "getDomains"; permission javax.management.MBeanPermission "SimpleStandard#State[MBeans:type=SimpleStandard]", "getAttribute"; diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy24 b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy24 index cbb92dff9827bf93cd455593bb484d113833f016..ed7f2c9da735ec6587d035da32a43e231489633c 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy24 +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy24 @@ -1,5 +1,6 @@ grant codebase "file:/-" { permission javax.security.auth.AuthPermission "createLoginContext.JMXPluggableAuthenticator"; + permission java.lang.RuntimePermission "*"; permission java.net.SocketPermission "*:*", "accept,connect,listen,resolve"; permission java.security.SecurityPermission "createAccessControlContext"; permission javax.management.remote.SubjectDelegationPermission "javax.management.remote.JMXPrincipal.monitorRole"; diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy25 b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy25 index 98b83de4453fd170afc143f6f0e5b5fc25983246..9acbd1a2ef6b5087e40a7e8daaab8ffb8e95ccd8 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy25 +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy25 @@ -1,5 +1,6 @@ grant codebase "file:/-" { permission javax.security.auth.AuthPermission "createLoginContext.JMXPluggableAuthenticator"; + permission java.lang.RuntimePermission "*"; permission java.net.SocketPermission "*:*", "accept,connect,listen,resolve"; permission java.security.SecurityPermission "createAccessControlContext"; permission javax.management.remote.SubjectDelegationPermission "javax.management.remote.JMXPrincipal.monitorRole"; diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy31 b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy31 index 70939f579f4ab63c161cffc6e1a9322ab439eb71..43d28c395bc6a30678f8bde24208039a2f230ab4 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy31 +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy31 @@ -1,6 +1,7 @@ grant codebase "file:/-" { permission javax.security.auth.AuthPermission "createLoginContext.JMXPluggableAuthenticator"; permission java.net.SocketPermission "*:*", "accept,connect,listen,resolve"; + permission java.lang.RuntimePermission "*"; permission java.security.SecurityPermission "createAccessControlContext"; permission javax.management.MBeanPermission "*", "getDomains"; permission javax.management.MBeanPermission "SimpleStandard#State[MBeans:type=SimpleStandard]", "getAttribute"; diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy32 b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy32 index 3f5354ec2ff31b5e400621625cea5509a899ef7d..bc4c7d44c280a5a7c320c85b428e92e0a2374741 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy32 +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy32 @@ -1,6 +1,7 @@ grant codebase "file:/-" { permission javax.security.auth.AuthPermission "createLoginContext.JMXPluggableAuthenticator"; permission java.net.SocketPermission "*:*", "accept,connect,listen,resolve"; + permission java.lang.RuntimePermission "*"; permission java.security.SecurityPermission "createAccessControlContext"; // permission javax.management.MBeanPermission "*", "getDomains"; permission javax.management.MBeanPermission "SimpleStandard#State[MBeans:type=SimpleStandard]", "getAttribute"; diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy33 b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy33 index b11df459d5a119ce3f0cf1e3b6ea74b1f13748b7..9a41f4c58eabf4ad42d6cdfa5e512eed44644320 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy33 +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy33 @@ -1,6 +1,7 @@ grant codebase "file:/-" { permission javax.security.auth.AuthPermission "createLoginContext.JMXPluggableAuthenticator"; permission java.net.SocketPermission "*:*", "accept,connect,listen,resolve"; + permission java.lang.RuntimePermission "*"; permission java.security.SecurityPermission "createAccessControlContext"; permission javax.management.MBeanPermission "*", "getDomains"; permission javax.management.MBeanPermission "SimpleStandard#State[MBeans:type=SimpleStandard]", "getAttribute"; diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy34 b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy34 index 761444e7a6c71e6b917f9de932e61222d7ac1f9e..dd935b0f150bcadeb66fe4717647e5b81e372433 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy34 +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy34 @@ -1,5 +1,6 @@ grant codebase "file:/-" { permission javax.security.auth.AuthPermission "createLoginContext.JMXPluggableAuthenticator"; + permission java.lang.RuntimePermission "*"; permission java.net.SocketPermission "*:*", "accept,connect,listen,resolve"; permission java.security.SecurityPermission "createAccessControlContext"; permission javax.management.remote.SubjectDelegationPermission "javax.management.remote.JMXPrincipal.monitorRole"; diff --git a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy35 b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy35 index 5aebb6bc8888d49c98ef441a49bed67d7b10f626..29b10230e7d0cdd268c96741b4a82b418ba0ca90 100644 --- a/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy35 +++ b/jdk/test/javax/management/remote/mandatory/subjectDelegation/policy35 @@ -1,5 +1,6 @@ grant codebase "file:/-" { permission javax.security.auth.AuthPermission "createLoginContext.JMXPluggableAuthenticator"; + permission java.lang.RuntimePermission "*"; permission java.net.SocketPermission "*:*", "accept,connect,listen,resolve"; permission java.security.SecurityPermission "createAccessControlContext"; permission javax.management.remote.SubjectDelegationPermission "javax.management.remote.JMXPrincipal.monitorRole"; diff --git a/jdk/test/sun/management/jdp/DynamicLauncher.java b/jdk/test/sun/management/jdp/DynamicLauncher.java index 934002c056b15f56ec4a2db344a35eb29f6c738e..f55d0c8b671349963f3272fb08870b1955f7b75c 100644 --- a/jdk/test/sun/management/jdp/DynamicLauncher.java +++ b/jdk/test/sun/management/jdp/DynamicLauncher.java @@ -58,6 +58,11 @@ public abstract class DynamicLauncher { } } } while (tryAgain); + output.shouldHaveExitValue(0); + // java.lang.Exception is thrown by JdpTestCase if something goes wrong + // for instance - see JdpTestCase::shutdown() + output.shouldNotContain("java.lang.Exception:"); + output.shouldNotContain("Error: Could not find or load main class"); } protected OutputAnalyzer runVM() throws Exception { diff --git a/jdk/test/sun/management/jdp/JdpJmxRemoteDynamicPortTest.java b/jdk/test/sun/management/jdp/JdpJmxRemoteDynamicPortTest.java index d79e2245870ef1c7dbcf07864a7d4b23a8903432..993cf930846eaa188e7a41458e218c1cbad57649 100644 --- a/jdk/test/sun/management/jdp/JdpJmxRemoteDynamicPortTest.java +++ b/jdk/test/sun/management/jdp/JdpJmxRemoteDynamicPortTest.java @@ -40,7 +40,6 @@ public class JdpJmxRemoteDynamicPortTest extends DynamicLauncher { public static void main(String[] args) throws Exception { DynamicLauncher launcher = new JdpJmxRemoteDynamicPortTest(); launcher.run(); - launcher.getProcessOutpoutAnalyzer().stderrShouldNotContain("java.lang.Exception:"); } protected String[] options() {