mirror of
https://github.com/openjdk/jdk.git
synced 2025-08-28 15:24:43 +02:00
8281658: Add a security category to the java -XshowSettings option
Reviewed-by: rriggs, mullan
This commit is contained in:
parent
43099a85b1
commit
2e12a123c9
5 changed files with 318 additions and 6 deletions
|
@ -47,8 +47,8 @@ import java.lang.module.ModuleDescriptor.Requires;
|
||||||
import java.lang.module.ModuleFinder;
|
import java.lang.module.ModuleFinder;
|
||||||
import java.lang.module.ModuleReference;
|
import java.lang.module.ModuleReference;
|
||||||
import java.lang.module.ResolvedModule;
|
import java.lang.module.ResolvedModule;
|
||||||
import java.lang.reflect.InvocationTargetException;
|
|
||||||
import java.lang.reflect.Constructor;
|
import java.lang.reflect.Constructor;
|
||||||
|
import java.lang.reflect.InvocationTargetException;
|
||||||
import java.lang.reflect.Method;
|
import java.lang.reflect.Method;
|
||||||
import java.lang.reflect.Modifier;
|
import java.lang.reflect.Modifier;
|
||||||
import java.math.BigDecimal;
|
import java.math.BigDecimal;
|
||||||
|
@ -78,7 +78,6 @@ import java.util.jar.Manifest;
|
||||||
import java.util.stream.Collectors;
|
import java.util.stream.Collectors;
|
||||||
import java.util.stream.Stream;
|
import java.util.stream.Stream;
|
||||||
|
|
||||||
import jdk.internal.util.OperatingSystem;
|
|
||||||
import jdk.internal.misc.MainMethodFinder;
|
import jdk.internal.misc.MainMethodFinder;
|
||||||
import jdk.internal.misc.PreviewFeatures;
|
import jdk.internal.misc.PreviewFeatures;
|
||||||
import jdk.internal.misc.VM;
|
import jdk.internal.misc.VM;
|
||||||
|
@ -86,6 +85,7 @@ import jdk.internal.module.ModuleBootstrap;
|
||||||
import jdk.internal.module.Modules;
|
import jdk.internal.module.Modules;
|
||||||
import jdk.internal.platform.Container;
|
import jdk.internal.platform.Container;
|
||||||
import jdk.internal.platform.Metrics;
|
import jdk.internal.platform.Metrics;
|
||||||
|
import jdk.internal.util.OperatingSystem;
|
||||||
import sun.util.calendar.ZoneInfoFile;
|
import sun.util.calendar.ZoneInfoFile;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -172,6 +172,10 @@ public final class LauncherHelper {
|
||||||
case "locale":
|
case "locale":
|
||||||
printLocale();
|
printLocale();
|
||||||
break;
|
break;
|
||||||
|
case "security":
|
||||||
|
var opt = opts.length > 2 ? opts[2].trim() : "all";
|
||||||
|
SecuritySettings.printSecuritySettings(opt, ostream);
|
||||||
|
break;
|
||||||
case "system":
|
case "system":
|
||||||
if (OperatingSystem.isLinux()) {
|
if (OperatingSystem.isLinux()) {
|
||||||
printSystemMetrics();
|
printSystemMetrics();
|
||||||
|
@ -181,6 +185,7 @@ public final class LauncherHelper {
|
||||||
printVmSettings(initialHeapSize, maxHeapSize, stackSize);
|
printVmSettings(initialHeapSize, maxHeapSize, stackSize);
|
||||||
printProperties();
|
printProperties();
|
||||||
printLocale();
|
printLocale();
|
||||||
|
SecuritySettings.printSecuritySummarySettings(ostream);
|
||||||
if (OperatingSystem.isLinux()) {
|
if (OperatingSystem.isLinux()) {
|
||||||
printSystemMetrics();
|
printSystemMetrics();
|
||||||
}
|
}
|
||||||
|
@ -318,9 +323,10 @@ public final class LauncherHelper {
|
||||||
ostream.print(INDENT + INDENT);
|
ostream.print(INDENT + INDENT);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
ostream.println();
|
||||||
}
|
}
|
||||||
|
|
||||||
public static void printSystemMetrics() {
|
private static void printSystemMetrics() {
|
||||||
Metrics c = Container.metrics();
|
Metrics c = Container.metrics();
|
||||||
|
|
||||||
ostream.println("Operating System Metrics:");
|
ostream.println("Operating System Metrics:");
|
||||||
|
|
217
src/java.base/share/classes/sun/launcher/SecuritySettings.java
Normal file
217
src/java.base/share/classes/sun/launcher/SecuritySettings.java
Normal file
|
@ -0,0 +1,217 @@
|
||||||
|
/*
|
||||||
|
* Copyright (c) 2023, Oracle and/or its affiliates. All rights reserved.
|
||||||
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
|
*
|
||||||
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
* under the terms of the GNU General Public License version 2 only, as
|
||||||
|
* published by the Free Software Foundation. Oracle designates this
|
||||||
|
* particular file as subject to the "Classpath" exception as provided
|
||||||
|
* by Oracle in the LICENSE file that accompanied this code.
|
||||||
|
*
|
||||||
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||||
|
* version 2 for more details (a copy is included in the LICENSE file that
|
||||||
|
* accompanied this code).
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License version
|
||||||
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||||
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
|
*
|
||||||
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||||
|
* or visit www.oracle.com if you need additional information or have any
|
||||||
|
* questions.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package sun.launcher;
|
||||||
|
|
||||||
|
import javax.net.ssl.SSLContext;
|
||||||
|
import javax.net.ssl.SSLSocket;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.io.PrintStream;
|
||||||
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.security.Provider;
|
||||||
|
import java.security.Security;
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.Comparator;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Properties;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
|
import jdk.internal.access.SharedSecrets;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A utility class for security libs functionality
|
||||||
|
* in the -XshowSettings:security output
|
||||||
|
*/
|
||||||
|
public final class SecuritySettings {
|
||||||
|
|
||||||
|
private static final String INDENT = " ";
|
||||||
|
private static final String TWOINDENT = INDENT + INDENT;
|
||||||
|
private static final String THREEINDENT = TWOINDENT + INDENT;
|
||||||
|
private static final String PROV_INFO_STRING = "Provider information: ";
|
||||||
|
private static PrintStream ostream = null;
|
||||||
|
|
||||||
|
static void printSecuritySettings(String arg, PrintStream stream) {
|
||||||
|
ostream = stream;
|
||||||
|
switch (arg) {
|
||||||
|
case "properties" -> printSecurityProperties();
|
||||||
|
case "providers" -> printSecurityProviderConfig(true);
|
||||||
|
case "tls" -> printSecurityTLSConfig(true);
|
||||||
|
case "all" -> printAllSecurityConfig();
|
||||||
|
default -> ostream.println(
|
||||||
|
"\nUnrecognized security subcommand. Valid values are " +
|
||||||
|
"\"all\", \"properties\", \"providers\", \"tls\". See \"java -X\"\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// A non-verbose description of some core security configuration settings
|
||||||
|
static void printSecuritySummarySettings(PrintStream stream) {
|
||||||
|
ostream = stream;
|
||||||
|
ostream.println("Security settings summary: " + "\n" +
|
||||||
|
INDENT + "See \"java -X\" for verbose security settings options");
|
||||||
|
printSecurityProviderConfig(false);
|
||||||
|
printSecurityTLSConfig(false);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void printAllSecurityConfig() {
|
||||||
|
ostream.println("Security settings:");
|
||||||
|
printSecurityProperties();
|
||||||
|
printSecurityProviderConfig(true);
|
||||||
|
printSecurityTLSConfig(true);
|
||||||
|
}
|
||||||
|
|
||||||
|
private static void printSecurityProperties() {
|
||||||
|
ostream.println(INDENT + "Security properties:");
|
||||||
|
Properties p = SharedSecrets.getJavaSecurityPropertiesAccess().getInitialProperties();
|
||||||
|
for (String key : p.stringPropertyNames().stream().sorted().toList()) {
|
||||||
|
String val = p.getProperty(key);
|
||||||
|
if (val.length() > 60) {
|
||||||
|
splitLongPropertyLines(key, val);
|
||||||
|
} else {
|
||||||
|
ostream.println(TWOINDENT + key + "=" + val);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
ostream.println();
|
||||||
|
}
|
||||||
|
|
||||||
|
private static void splitLongPropertyLines(String key, String val) {
|
||||||
|
// split long property values which use well known separator
|
||||||
|
if (val.contains(",") || val.contains(";")) {
|
||||||
|
String separator = (val.contains(",")) ? "," : ";";
|
||||||
|
ostream.println(TWOINDENT + key + "=");
|
||||||
|
String[] values = val.split(separator);
|
||||||
|
String lastValue = values[values.length -1].trim();
|
||||||
|
List.of(values).forEach(
|
||||||
|
s -> ostream.println(THREEINDENT + s.trim() +
|
||||||
|
(s.trim().equals(lastValue) ? "" : separator)));
|
||||||
|
} else {
|
||||||
|
ostream.println(TWOINDENT + key + "=" + val);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private static void printSecurityTLSConfig(boolean verbose) {
|
||||||
|
SSLSocket ssls;
|
||||||
|
SSLContext sslContext;
|
||||||
|
try {
|
||||||
|
sslContext = SSLContext.getDefault();
|
||||||
|
ssls = (SSLSocket)sslContext.getSocketFactory().createSocket();
|
||||||
|
} catch (IOException | NoSuchAlgorithmException e) {
|
||||||
|
ostream.println(INDENT + "Failed to create SSL socket");
|
||||||
|
ostream.println(INDENT + e + "\n");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
ostream.println(INDENT + "Security TLS configuration (" +
|
||||||
|
sslContext.getProvider().getName() + " provider):");
|
||||||
|
ostream.println(TWOINDENT + "Enabled Protocols:");
|
||||||
|
for (String s : ssls.getEnabledProtocols()) {
|
||||||
|
ostream.println(THREEINDENT + s);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (verbose) {
|
||||||
|
ostream.println("\n" + TWOINDENT + "Enabled Cipher Suites:");
|
||||||
|
for (String s : ssls.getEnabledCipherSuites()) {
|
||||||
|
ostream.println(THREEINDENT + s);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
ostream.println();
|
||||||
|
}
|
||||||
|
|
||||||
|
private static void printSecurityProviderConfig(boolean verbose) {
|
||||||
|
ostream.println(INDENT + "Security provider static configuration: (in order of preference)");
|
||||||
|
for (Provider p : Security.getProviders()) {
|
||||||
|
if (verbose) {
|
||||||
|
// separate the views out
|
||||||
|
ostream.println(TWOINDENT + "-".repeat(40));
|
||||||
|
}
|
||||||
|
ostream.println(TWOINDENT + "Provider name: " + p.getName());
|
||||||
|
if (verbose) {
|
||||||
|
ostream.println(wrappedString(PROV_INFO_STRING + p.getInfo(), 80,
|
||||||
|
TWOINDENT, THREEINDENT));
|
||||||
|
ostream.println(TWOINDENT + "Provider services: (type : algorithm)");
|
||||||
|
Set<Provider.Service> services = p.getServices();
|
||||||
|
Set<String> keys = Collections.list(p.keys())
|
||||||
|
.stream()
|
||||||
|
.map(String.class::cast)
|
||||||
|
.filter(s -> s.startsWith("Alg.Alias."))
|
||||||
|
.collect(Collectors.toSet());
|
||||||
|
if (!services.isEmpty()) {
|
||||||
|
services.stream()
|
||||||
|
.sorted(Comparator.comparing(Provider.Service::getType)
|
||||||
|
.thenComparing(Provider.Service::getAlgorithm))
|
||||||
|
.forEach(ps -> {
|
||||||
|
ostream.println(THREEINDENT +
|
||||||
|
ps.getType() + "." + ps.getAlgorithm());
|
||||||
|
List<String> aliases = keys
|
||||||
|
.stream()
|
||||||
|
.filter(s -> s.startsWith("Alg.Alias." + ps.getType()))
|
||||||
|
.filter(s -> p.getProperty(s).equals(ps.getAlgorithm()))
|
||||||
|
.map(s -> s.substring(("Alg.Alias." + ps.getType() + ".").length()))
|
||||||
|
.toList();
|
||||||
|
|
||||||
|
if (!aliases.isEmpty()) {
|
||||||
|
ostream.println(wrappedString(
|
||||||
|
aliases.stream()
|
||||||
|
.collect(Collectors.joining(", ", INDENT + " aliases: [", "]")),
|
||||||
|
80, " " + TWOINDENT, INDENT + THREEINDENT));
|
||||||
|
}
|
||||||
|
});
|
||||||
|
} else {
|
||||||
|
ostream.println(THREEINDENT + "<none>");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (verbose) {
|
||||||
|
ostream.println();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// return a string split across multiple lines which aims to limit max length
|
||||||
|
private static String wrappedString(String orig, int limit,
|
||||||
|
String initIndent, String successiveIndent) {
|
||||||
|
if (orig == null || orig.isEmpty() || limit <= 0) {
|
||||||
|
// bad input
|
||||||
|
return orig;
|
||||||
|
}
|
||||||
|
StringBuilder sb = new StringBuilder();
|
||||||
|
int widthCount = 0;
|
||||||
|
for (String s : orig.split(" ")) {
|
||||||
|
if (widthCount == 0) {
|
||||||
|
// first iteration only
|
||||||
|
sb.append(initIndent + s);
|
||||||
|
widthCount = s.length() + initIndent.length();
|
||||||
|
} else {
|
||||||
|
if (widthCount + s.length() > limit) {
|
||||||
|
sb.append("\n" + successiveIndent + s);
|
||||||
|
widthCount = s.length() + successiveIndent.length();
|
||||||
|
} else {
|
||||||
|
sb.append(" " + s);
|
||||||
|
widthCount += s.length() + 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return sb.toString();
|
||||||
|
}
|
||||||
|
}
|
|
@ -170,6 +170,16 @@ java.launcher.X.usage=\n\
|
||||||
\ show all property settings and continue\n\
|
\ show all property settings and continue\n\
|
||||||
\ -XshowSettings:vm\n\
|
\ -XshowSettings:vm\n\
|
||||||
\ show all vm related settings and continue\n\
|
\ show all vm related settings and continue\n\
|
||||||
|
\ -XshowSettings:security\n\
|
||||||
|
\ show all security settings and continue\n\
|
||||||
|
\ -XshowSettings:security:all\n\
|
||||||
|
\ show all security settings and continue\n\
|
||||||
|
\ -XshowSettings:security:properties\n\
|
||||||
|
\ show security properties and continue\n\
|
||||||
|
\ -XshowSettings:security:providers\n\
|
||||||
|
\ show static security provider settings and continue\n\
|
||||||
|
\ -XshowSettings:security:tls\n\
|
||||||
|
\ show TLS related security settings and continue\n\
|
||||||
\ -XshowSettings:system\n\
|
\ -XshowSettings:system\n\
|
||||||
\ (Linux Only) show host system or container\n\
|
\ (Linux Only) show host system or container\n\
|
||||||
\ configuration and continue\n\
|
\ configuration and continue\n\
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2022, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 2022, 2023, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
@ -36,7 +36,7 @@ import java.util.Optional;
|
||||||
/*
|
/*
|
||||||
* @test
|
* @test
|
||||||
* @summary Throw error if default java.security file is missing
|
* @summary Throw error if default java.security file is missing
|
||||||
* @bug 8155246 8292297 8292177
|
* @bug 8155246 8292297 8292177 8281658
|
||||||
* @library /test/lib
|
* @library /test/lib
|
||||||
* @run main ConfigFileTest
|
* @run main ConfigFileTest
|
||||||
*/
|
*/
|
||||||
|
@ -71,6 +71,10 @@ public class ConfigFileTest {
|
||||||
copyJDK(jdkTestDir, copyJdkDir);
|
copyJDK(jdkTestDir, copyJdkDir);
|
||||||
String extraPropsFile = Path.of(System.getProperty("test.src"), "override.props").toString();
|
String extraPropsFile = Path.of(System.getProperty("test.src"), "override.props").toString();
|
||||||
|
|
||||||
|
// sanity test -XshowSettings:security option
|
||||||
|
exerciseShowSettingsSecurity(copiedJava.toString(), "-cp", System.getProperty("test.classes"),
|
||||||
|
"-Djava.security.debug=all", "-XshowSettings:security", "ConfigFileTest", "runner");
|
||||||
|
|
||||||
// exercise some debug flags while we're here
|
// exercise some debug flags while we're here
|
||||||
// regular JDK install - should expect success
|
// regular JDK install - should expect success
|
||||||
exerciseSecurity(0, "java",
|
exerciseSecurity(0, "java",
|
||||||
|
@ -136,6 +140,16 @@ public class ConfigFileTest {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// exercise the -XshowSettings:security launcher
|
||||||
|
private static void exerciseShowSettingsSecurity(String... args) throws Exception {
|
||||||
|
ProcessBuilder process = new ProcessBuilder(args);
|
||||||
|
OutputAnalyzer oa = ProcessTools.executeProcess(process);
|
||||||
|
oa.shouldHaveExitValue(0)
|
||||||
|
.shouldContain("Security properties:")
|
||||||
|
.shouldContain("Security provider static configuration:")
|
||||||
|
.shouldContain("Security TLS configuration");
|
||||||
|
}
|
||||||
|
|
||||||
private static void copyJDK(Path src, Path dst) throws Exception {
|
private static void copyJDK(Path src, Path dst) throws Exception {
|
||||||
Files.walk(src)
|
Files.walk(src)
|
||||||
.skip(1)
|
.skip(1)
|
||||||
|
|
|
@ -25,7 +25,7 @@ import java.io.IOException;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* @test
|
* @test
|
||||||
* @bug 6994753 7123582 8305950
|
* @bug 6994753 7123582 8305950 8281658
|
||||||
* @summary tests -XshowSettings options
|
* @summary tests -XshowSettings options
|
||||||
* @modules jdk.compiler
|
* @modules jdk.compiler
|
||||||
* jdk.zipfs
|
* jdk.zipfs
|
||||||
|
@ -67,6 +67,13 @@ public class Settings extends TestHelper {
|
||||||
private static final String VM_SETTINGS = "VM settings:";
|
private static final String VM_SETTINGS = "VM settings:";
|
||||||
private static final String PROP_SETTINGS = "Property settings:";
|
private static final String PROP_SETTINGS = "Property settings:";
|
||||||
private static final String LOCALE_SETTINGS = "Locale settings:";
|
private static final String LOCALE_SETTINGS = "Locale settings:";
|
||||||
|
private static final String SEC_PROPS_SETTINGS = "Security properties:";
|
||||||
|
private static final String SEC_SUMMARY_PROPS_SETTINGS =
|
||||||
|
"Security settings summary:";
|
||||||
|
private static final String SEC_PROVIDER_SETTINGS =
|
||||||
|
"Security provider static configuration:";
|
||||||
|
private static final String SEC_TLS_SETTINGS = "Security TLS configuration";
|
||||||
|
private static final String BAD_SEC_OPTION_MSG = "Unrecognized security subcommand";
|
||||||
private static final String SYSTEM_SETTINGS = "Operating System Metrics:";
|
private static final String SYSTEM_SETTINGS = "Operating System Metrics:";
|
||||||
private static final String STACKSIZE_SETTINGS = "Stack Size:";
|
private static final String STACKSIZE_SETTINGS = "Stack Size:";
|
||||||
private static final String TZDATA_SETTINGS = "tzdata version";
|
private static final String TZDATA_SETTINGS = "tzdata version";
|
||||||
|
@ -75,6 +82,11 @@ public class Settings extends TestHelper {
|
||||||
checkContains(tr, VM_SETTINGS);
|
checkContains(tr, VM_SETTINGS);
|
||||||
checkContains(tr, PROP_SETTINGS);
|
checkContains(tr, PROP_SETTINGS);
|
||||||
checkContains(tr, LOCALE_SETTINGS);
|
checkContains(tr, LOCALE_SETTINGS);
|
||||||
|
// no verbose security settings unless "security" used
|
||||||
|
checkNotContains(tr, SEC_PROPS_SETTINGS);
|
||||||
|
checkContains(tr, SEC_SUMMARY_PROPS_SETTINGS);
|
||||||
|
checkContains(tr, SEC_PROVIDER_SETTINGS);
|
||||||
|
checkContains(tr, SEC_TLS_SETTINGS);
|
||||||
checkContains(tr, TZDATA_SETTINGS);
|
checkContains(tr, TZDATA_SETTINGS);
|
||||||
if (System.getProperty("os.name").contains("Linux")) {
|
if (System.getProperty("os.name").contains("Linux")) {
|
||||||
checkContains(tr, SYSTEM_SETTINGS);
|
checkContains(tr, SYSTEM_SETTINGS);
|
||||||
|
@ -144,6 +156,54 @@ public class Settings extends TestHelper {
|
||||||
checkContains(tr, TZDATA_SETTINGS);
|
checkContains(tr, TZDATA_SETTINGS);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void runTestOptionSecurity() throws IOException {
|
||||||
|
TestResult tr = doExec(javaCmd, "-XshowSettings:security");
|
||||||
|
checkNotContains(tr, VM_SETTINGS);
|
||||||
|
checkNotContains(tr, PROP_SETTINGS);
|
||||||
|
checkContains(tr, SEC_PROPS_SETTINGS);
|
||||||
|
checkContains(tr, SEC_PROVIDER_SETTINGS);
|
||||||
|
checkContains(tr, SEC_TLS_SETTINGS);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void runTestOptionSecurityProps() throws IOException {
|
||||||
|
TestResult tr = doExec(javaCmd, "-XshowSettings:security:properties");
|
||||||
|
checkContains(tr, SEC_PROPS_SETTINGS);
|
||||||
|
checkNotContains(tr, SEC_PROVIDER_SETTINGS);
|
||||||
|
checkNotContains(tr, SEC_TLS_SETTINGS);
|
||||||
|
// test a well known property for sanity
|
||||||
|
checkContains(tr, "keystore.type=pkcs12");
|
||||||
|
}
|
||||||
|
|
||||||
|
static void runTestOptionSecurityProv() throws IOException {
|
||||||
|
TestResult tr = doExec(javaCmd, "-XshowSettings:security:providers");
|
||||||
|
checkNotContains(tr, SEC_PROPS_SETTINGS);
|
||||||
|
checkContains(tr, SEC_PROVIDER_SETTINGS);
|
||||||
|
checkNotContains(tr, SEC_TLS_SETTINGS);
|
||||||
|
// test a well known Provider for sanity
|
||||||
|
checkContains(tr, "Provider name: SUN");
|
||||||
|
// test for a well known alias (SunJCE: AlgorithmParameterGenerator.DiffieHellman)
|
||||||
|
checkContains(tr, "aliases: [1.2.840.113549.1.3.1, " +
|
||||||
|
"DH, OID.1.2.840.113549.1.3.1]");
|
||||||
|
}
|
||||||
|
|
||||||
|
static void runTestOptionSecurityTLS() throws IOException {
|
||||||
|
TestResult tr = doExec(javaCmd, "-XshowSettings:security:tls");
|
||||||
|
checkNotContains(tr, SEC_PROPS_SETTINGS);
|
||||||
|
checkNotContains(tr, SEC_PROVIDER_SETTINGS);
|
||||||
|
checkContains(tr, SEC_TLS_SETTINGS);
|
||||||
|
// test a well known TLS config for sanity
|
||||||
|
checkContains(tr, "TLSv1.2");
|
||||||
|
}
|
||||||
|
|
||||||
|
// ensure error message is printed when unrecognized option used
|
||||||
|
static void runTestOptionBadSecurityOption() throws IOException {
|
||||||
|
TestResult tr = doExec(javaCmd, "-XshowSettings:security:bad");
|
||||||
|
checkContains(tr, BAD_SEC_OPTION_MSG);
|
||||||
|
// we print all security settings in such scenario
|
||||||
|
checkNotContains(tr, SEC_PROPS_SETTINGS);
|
||||||
|
checkNotContains(tr, SEC_PROVIDER_SETTINGS);
|
||||||
|
checkNotContains(tr, SEC_TLS_SETTINGS);
|
||||||
|
}
|
||||||
static void runTestOptionSystem() throws IOException {
|
static void runTestOptionSystem() throws IOException {
|
||||||
TestResult tr = doExec(javaCmd, "-XshowSettings:system");
|
TestResult tr = doExec(javaCmd, "-XshowSettings:system");
|
||||||
if (System.getProperty("os.name").contains("Linux")) {
|
if (System.getProperty("os.name").contains("Linux")) {
|
||||||
|
@ -181,6 +241,11 @@ public class Settings extends TestHelper {
|
||||||
runTestOptionVM();
|
runTestOptionVM();
|
||||||
runTestOptionProperty();
|
runTestOptionProperty();
|
||||||
runTestOptionLocale();
|
runTestOptionLocale();
|
||||||
|
runTestOptionSecurity();
|
||||||
|
runTestOptionSecurityProps();
|
||||||
|
runTestOptionSecurityProv();
|
||||||
|
runTestOptionSecurityTLS();
|
||||||
|
runTestOptionBadSecurityOption();
|
||||||
runTestOptionSystem();
|
runTestOptionSystem();
|
||||||
runTestBadOptions();
|
runTestBadOptions();
|
||||||
runTest7123582();
|
runTest7123582();
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue