diff --git a/test/sun/security/tools/policytool/ChangeUI.html b/test/sun/security/tools/policytool/ChangeUI.html index feb9da297af329f7d4363b06b2c041231628015e..d025716ea03a616d6107f2c5971c90db8772f287 100644 --- a/test/sun/security/tools/policytool/ChangeUI.html +++ b/test/sun/security/tools/policytool/ChangeUI.html @@ -4,7 +4,7 @@ -ATTENTION: policytool now contains no platform-specific codes anymore and +ATTENTION: policytool now contains no platform-specific codes anymore and should behaves exactly the same across all platforms. This also means:
  1. You may only need to test it on one platform
  2. @@ -16,7 +16,8 @@ This is a multi-stage test. Click on "done" when you have completed reading these instructions.

    First, policytool will be invoked.

    -
      +
        +
      1. If testing on Windows, create a temporary directory. (Example: C:\foo\tmp)
      2. Add new policy entry
      3. Add permission:
        @@ -27,7 +28,7 @@ First, policytool will be invoked.

      4. Press OK
      5. Confirm the file name warning dialog appears
      6. Choose Retain, confirm the permission edit dialog is closed
      7. -
      8. Double click the newly craeted FilePermission entry to edit it
      9. +
      10. Double click the newly created FilePermission entry to edit it
      11. Press OK
      12. Confirm the file name warning dialog appears
      13. Choose Edit, confirm the permission edit dialog is still opened
      14. @@ -54,15 +55,17 @@ First, policytool will be invoked.

        AllPermission
      15. Add a new Principal, say, KerberosPrincipal with Principal Name as aaa -
      16. Confirm there is 1 entry in the Pricipals list +
      17. Confirm there is 1 entry in the Principals list
      18. Confirm there are 3 entries in the permission list
      19. Press cancel
      20. Double click the policy entry to edit it -
      21. Confirm there is ZERO entry in the Pricipals list +
      22. Confirm there are ZERO entries in the Principals list
      23. Confirm there are 2 entries in the permission list
      24. Press cancel -
      25. Save as /tmp/p -
      26. Confirm that the file /tmp/p looks like +
      27. Save as "/tmp/p"
        +If testing on Windows, save in the temporary directory created in Step 0. +(Example: Save as "C:\foo\tmp\p.policy") +
      28. Confirm that the file /tmp/p (or C:\foo\tmp\p.policy) looks like
         /* AUTOMATICALLY GENERATED ON Tue Jul 19 16:27:30 CST 2005*/
         /* DO NOT EDIT */
        diff --git a/test/sun/security/tools/policytool/UpdatePermissions.html b/test/sun/security/tools/policytool/UpdatePermissions.html
        index 5ae3cbcc421d4c3896b494f9b80fe1fe2f2ed29f..2a59b5908aef6705a3a4810fc0cff6cc3e506ecc 100644
        --- a/test/sun/security/tools/policytool/UpdatePermissions.html
        +++ b/test/sun/security/tools/policytool/UpdatePermissions.html
        @@ -10,6 +10,8 @@ reading these instructions.

        First, policytool will be invoked.

        Then, follow these steps:
        +0) If testing on Windows, create a temporary directory. +(Example: C:\foo\tmp)

        1) Click on the "Add Policy Entry" button in the main policytool window.

        @@ -29,13 +31,18 @@ select "listenToAllAWTEvents".

        select "Save As".

        8) In the SaveAs window, enter "/tmp/ptool.test" as the file name -and click "OK".

        +and click "OK".
        +If testing on Windows, use the temporary directory created in Step 0. +(Example: Save as "C:\foo\tmp\ptool.test")

        + +9) cat /tmp/ptool.test
        +If testing on Windows, check the contents of the file created in the previous +step.

        -9) cat /tmp/ptool.test

        10) check to make sure that the new entry is in the policy file.

        -11) repeat steps 1-9 for:
        +11) repeat steps 1-10 for:
        AWTPermission: readDisplayPixels
        NetPermission: specifyStreamHandler
        RuntimePermission: setContextClassLoader, @@ -46,7 +53,8 @@ and click "OK".

        In the confirmation dialog pop-up, click "OK".

        -Exit policytool.

        +Exit policytool. If testing on Windows, delete the temporary directory and its +contents created during this test.

        Press "Pass" if ... press "Fail" otherwise.

        diff --git a/test/sun/security/tools/policytool/i18n.html b/test/sun/security/tools/policytool/i18n.html index 73d8d5723075e97cc9a850f9d6d8ae4c8e3b87e6..6c70d24398cc7978933adbda6753fe124746224f 100644 --- a/test/sun/security/tools/policytool/i18n.html +++ b/test/sun/security/tools/policytool/i18n.html @@ -17,7 +17,8 @@ the test passed.

        Press "Pass" if ... press "Fail" otherwise.

        -

          +
            +
          1. If testing on Windows, create a temporary directory. (Example: C:\foo\tmp)
          2. Pull down the 'File' and 'KeyStore' menus and check values
          3. Pull down 'File' menu and select 'View Warning Log'. Confirm FileNotFound.
          4. Pull down 'File' menu and select 'New'. @@ -54,14 +55,17 @@ Press "Pass" if ... press "Fail" otherwise.
          5. Do not remove the entry, click 'Cancel'.
          6. Pull down 'File' menu and select 'Exit'. Confirm Save option. Click 'Cancel'. -
          7. Select 'File' menu value 'Save', enter "/tmp/policy1" as the filename, - and check status message +
          8. Select 'File' menu value 'Save' and enter "/tmp/policy1" as the filename.
            + If testing on Windows, use the temporary directory created in Step 0. + (Example: Save as "C:\foo\tmp\policy1")
            + Check status message.
          9. Select 'File' menu value 'New'
          10. Click 'Add Policy Entry', type in "hello" for 'SignedBy' field, click 'Done'. Confirm warning.
          11. Select 'File' menu value 'Open' and confirm save option (do not save changes) -
          12. Type "/tmp/policy1" for the filename and confirm warning message +
          13. Type "/tmp/policy1" (if Windows, "C:\foo\tmp\policy1") for the filename + and confirm warning message
          14. Pull down 'File' menu, select 'View Warning Log' and confirm KeyStore alias warning
          15. Pull down 'KeyStore' menu and select 'Edit' @@ -80,11 +84,13 @@ Press "Pass" if ... press "Fail" otherwise.
          16. Pull down 'KeyStore' menu and select 'Edit'
          17. Confirm URL, Type, Provider, and Password URL values.
          18. Click OK -
          19. Pull down 'File' menu and select 'Save As'. Enter /tmp/policy2. - Confirm status message. +
          20. Pull down 'File' menu and select 'Save As'. Enter "/tmp/policy2" + (if Windows, "C:\foo\tmp\policy2"). + Confirm status message.
          21. Pull down 'File' menu and select 'New'. -
          22. Pull down 'File' menu and select 'Open'. Enter /tmp/policy2. - Confirm warning message. +
          23. Pull down 'File' menu and select 'Open'. Enter "/tmp/policy2" + (if Windows, "C:\foo\tmp\policy2"). + Confirm warning message.
          24. Click on 'Add Policy Entry', enter Codebase 'http://foo', SignedBy 'bar'. Click on 'Done' and confirm alias warning.
          25. Double-Click on just created policy entry, confirm edit window appears. @@ -115,6 +121,8 @@ Press "Pass" if ... press "Fail" otherwise.
          26. Confirm entries in main window listing.
          27. Select 'File' menu value 'Exit'
          28. Save Changes, confirm status message. +
          29. If testing on Windows, delete the temporary directory and its contents + created during this test.