/hg/icedtea6: Backport of regression tests fix

ptisnovs at icedtea.classpath.org ptisnovs at icedtea.classpath.org
Tue Dec 7 03:08:20 PST 2010


changeset 814f715ce323 in /hg/icedtea6
details: http://icedtea.classpath.org/hg/icedtea6?cmd=changeset;node=814f715ce323
author: ptisnovs
date: Tue Dec 07 12:11:55 2010 +0100

	Backport of regression tests fix (sun/security/ssl/sun/net/www/proto
	col/https/HttpsURLConnection/*entities.java).


diffstat:

4 files changed, 522 insertions(+), 1 deletion(-)
ChangeLog                                      |    8 
Makefile.am                                    |    4 
patches/openjdk/6941936-broken-pipe.patch      |  438 ++++++++++++++++++++++++
patches/openjdk/6943219-failure-in-linux.patch |   73 ++++

diffs (truncated from 548 to 500 lines):

diff -r ccb45c2618bd -r 814f715ce323 ChangeLog
--- a/ChangeLog	Mon Dec 06 17:04:54 2010 -0500
+++ b/ChangeLog	Tue Dec 07 12:11:55 2010 +0100
@@ -1,3 +1,11 @@ 2010-12-06  Denis Lila <dlila at redhat.com
+2010-12-07  Pavel Tisnovsky  <ptisnovs at redhat.com>
+
+	* Makefile.am:
+	(ICEDTEA_PATCHES): Updated.
+	* patches/openjdk/6941936-broken-pipe.patch:
+	* patches/openjdk/6943219-failure-in-linux.patch:
+	Backport of regression test fix.
+
 2010-12-06  Denis Lila <dlila at redhat.com>
 
 	* Makefile.am:
diff -r ccb45c2618bd -r 814f715ce323 Makefile.am
--- a/Makefile.am	Mon Dec 06 17:04:54 2010 -0500
+++ b/Makefile.am	Tue Dec 07 12:11:55 2010 +0100
@@ -305,7 +305,9 @@ ICEDTEA_PATCHES = \
 	patches/jtreg-T6638712-fix.patch \
 	patches/openjdk/7002666-eclipse_cdt_oops_crash.patch \
 	patches/jtreg-T6650759m-fix.patch \
-	patches/openjdk/7003777-bad-html-entity-parse.patch
+	patches/openjdk/7003777-bad-html-entity-parse.patch \
+	patches/openjdk/6941936-broken-pipe.patch \
+	patches/openjdk/6943219-failure-in-linux.patch
 
 if WITH_ALT_HSBUILD
 ICEDTEA_PATCHES += \
diff -r ccb45c2618bd -r 814f715ce323 patches/openjdk/6941936-broken-pipe.patch
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/patches/openjdk/6941936-broken-pipe.patch	Tue Dec 07 12:11:55 2010 +0100
@@ -0,0 +1,438 @@
+# HG changeset patch
+# User xuelei
+# Date 1270861992 -28800
+# Node ID 89f4ec9e4b33f239c875531c07f326992ac5159d
+# Parent  710c4493902f39c88d6c99c3a9c3e7a57e50f100
+6941936: Broken pipe error of test case DNSIdentities.java
+Reviewed-by: chegar
+
+diff -r 710c4493902f -r 89f4ec9e4b33 test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java
+--- openjdk-old/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java	Fri Apr 09 07:21:46 2010 -0700
++++ openjdk/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java	Sat Apr 10 09:13:12 2010 +0800
+@@ -624,6 +624,11 @@
+     volatile static boolean serverReady = false;
+ 
+     /*
++     * Is the connection ready to close?
++     */
++    volatile static boolean closeReady = false;
++
++    /*
+      * Turn on SSL debugging?
+      */
+     static boolean debug = false;
+@@ -670,11 +675,14 @@
+             out.print("Testing\r\n");
+             out.flush();
+         } finally {
+-             // close the socket
+-             Thread.sleep(2000);
+-             System.out.println("Server closing socket");
+-             sslSocket.close();
+-             serverReady = false;
++            // close the socket
++            while (!closeReady) {
++                Thread.sleep(50);
++            }
++
++            System.out.println("Server closing socket");
++            sslSocket.close();
++            serverReady = false;
+         }
+ 
+     }
+@@ -704,12 +712,17 @@
+         URL url = new URL("https://localhost:" + serverPort+"/");
+         System.out.println("url is "+url.toString());
+ 
+-        http = (HttpsURLConnection)url.openConnection();
++        try {
++            http = (HttpsURLConnection)url.openConnection();
+ 
+-        int respCode = http.getResponseCode();
+-        System.out.println("respCode = "+respCode);
+-
+-        http.disconnect();
++            int respCode = http.getResponseCode();
++            System.out.println("respCode = "+respCode);
++        } finally {
++            if (http != null) {
++                http.disconnect();
++            }
++            closeReady = true;
++        }
+     }
+ 
+     /*
+diff -r 710c4493902f -r 89f4ec9e4b33 test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsPost.java
+--- openjdk-old/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsPost.java	Fri Apr 09 07:21:46 2010 -0700
++++ openjdk/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsPost.java	Sat Apr 10 09:13:12 2010 +0800
+@@ -61,6 +61,11 @@
+     volatile static boolean serverReady = false;
+ 
+     /*
++     * Is the connection ready to close?
++     */
++    volatile static boolean closeReady = false;
++
++    /*
+      * Turn on SSL debugging?
+      */
+     static boolean debug = false;
+@@ -98,25 +103,34 @@
+         serverReady = true;
+ 
+         SSLSocket sslSocket = (SSLSocket) sslServerSocket.accept();
+-        InputStream sslIS = sslSocket.getInputStream();
+-        OutputStream sslOS = sslSocket.getOutputStream();
+-        BufferedReader br = new BufferedReader(new InputStreamReader(sslIS));
+-        PrintStream ps = new PrintStream(sslOS);
+-        // process HTTP POST request from client
+-        System.out.println("status line: "+br.readLine());
+-        String msg = null;
+-        while ((msg = br.readLine()) != null && msg.length() > 0);
++        try {
++            InputStream sslIS = sslSocket.getInputStream();
++            OutputStream sslOS = sslSocket.getOutputStream();
++            BufferedReader br =
++                        new BufferedReader(new InputStreamReader(sslIS));
++            PrintStream ps = new PrintStream(sslOS);
+ 
+-        msg = br.readLine();
+-        if (msg.equals(postMsg)) {
+-            ps.println("HTTP/1.1 200 OK\n\n");
+-        } else {
+-            ps.println("HTTP/1.1 500 Not OK\n\n");
++            // process HTTP POST request from client
++            System.out.println("status line: "+br.readLine());
++            String msg = null;
++            while ((msg = br.readLine()) != null && msg.length() > 0);
++
++            msg = br.readLine();
++            if (msg.equals(postMsg)) {
++                ps.println("HTTP/1.1 200 OK\n\n");
++            } else {
++                ps.println("HTTP/1.1 500 Not OK\n\n");
++            }
++            ps.flush();
++
++            // close the socket
++            while (!closeReady) {
++                Thread.sleep(50);
++            }
++        } finally {
++            sslSocket.close();
++            sslServerSocket.close();
+         }
+-        ps.flush();
+-        Thread.sleep(2000);
+-        sslSocket.close();
+-        sslServerSocket.close();
+     }
+ 
+     /*
+@@ -144,12 +158,17 @@
+ 
+         http.setRequestMethod("POST");
+         PrintStream ps = new PrintStream(http.getOutputStream());
+-        ps.println(postMsg);
+-        ps.flush();
+-        if (http.getResponseCode() != 200) {
+-            throw new RuntimeException("test Failed");
++        try {
++            ps.println(postMsg);
++            ps.flush();
++            if (http.getResponseCode() != 200) {
++                throw new RuntimeException("test Failed");
++            }
++        } finally {
++            ps.close();
++            http.disconnect();
++            closeReady = true;
+         }
+-        ps.close();
+     }
+ 
+     static class NameVerifier implements HostnameVerifier {
+diff -r 710c4493902f -r 89f4ec9e4b33 test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java
+--- openjdk-old/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java	Fri Apr 09 07:21:46 2010 -0700
++++ openjdk/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java	Sat Apr 10 09:13:12 2010 +0800
+@@ -624,6 +624,11 @@
+     volatile static boolean serverReady = false;
+ 
+     /*
++     * Is the connection ready to close?
++     */
++    volatile static boolean closeReady = false;
++
++    /*
+      * Turn on SSL debugging?
+      */
+     static boolean debug = false;
+@@ -670,11 +675,14 @@
+             out.print("Testing\r\n");
+             out.flush();
+         } finally {
+-             // close the socket
+-             Thread.sleep(2000);
+-             System.out.println("Server closing socket");
+-             sslSocket.close();
+-             serverReady = false;
++            // close the socket
++            while (!closeReady) {
++                Thread.sleep(50);
++            }
++
++            System.out.println("Server closing socket");
++            sslSocket.close();
++            serverReady = false;
+         }
+ 
+     }
+@@ -716,7 +724,10 @@
+             // no subject alternative names matching IP address 127.0.0.1 found
+             // that's the expected exception, ignore it.
+         } finally {
+-            http.disconnect();
++            if (http != null) {
++                http.disconnect();
++            }
++            closeReady = true;
+         }
+     }
+ 
+diff -r 710c4493902f -r 89f4ec9e4b33 test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressIPIdentities.java
+--- openjdk-old/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressIPIdentities.java	Fri Apr 09 07:21:46 2010 -0700
++++ openjdk/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressIPIdentities.java	Sat Apr 10 09:13:12 2010 +0800
+@@ -625,6 +625,11 @@
+     volatile static boolean serverReady = false;
+ 
+     /*
++     * Is the connection ready to close?
++     */
++    volatile static boolean closeReady = false;
++
++    /*
+      * Turn on SSL debugging?
+      */
+     static boolean debug = false;
+@@ -672,7 +677,10 @@
+             out.flush();
+         } finally {
+              // close the socket
+-             Thread.sleep(2000);
++             while (!closeReady) {
++                 Thread.sleep(50);
++             }
++
+              System.out.println("Server closing socket");
+              sslSocket.close();
+              serverReady = false;
+@@ -705,12 +713,17 @@
+         URL url = new URL("https://127.0.0.1:" + serverPort+"/");
+         System.out.println("url is "+url.toString());
+ 
+-        http = (HttpsURLConnection)url.openConnection();
++        try {
++            http = (HttpsURLConnection)url.openConnection();
+ 
+-        int respCode = http.getResponseCode();
+-        System.out.println("respCode = "+respCode);
+-
+-        http.disconnect();
++            int respCode = http.getResponseCode();
++            System.out.println("respCode = "+respCode);
++        } finally {
++            if (http != null) {
++                http.disconnect();
++            }
++            closeReady = true;
++        }
+     }
+ 
+     /*
+diff -r 710c4493902f -r 89f4ec9e4b33 test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPIdentities.java
+--- openjdk-old/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPIdentities.java	Fri Apr 09 07:21:46 2010 -0700
++++ openjdk/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPIdentities.java	Sat Apr 10 09:13:12 2010 +0800
+@@ -625,6 +625,11 @@
+     volatile static boolean serverReady = false;
+ 
+     /*
++     * Is the connection ready to close?
++     */
++    volatile static boolean closeReady = false;
++
++    /*
+      * Turn on SSL debugging?
+      */
+     static boolean debug = false;
+@@ -672,7 +677,10 @@
+             out.flush();
+         } finally {
+              // close the socket
+-             Thread.sleep(2000);
++             while (!closeReady) {
++                 Thread.sleep(50);
++             }
++
+              System.out.println("Server closing socket");
+              sslSocket.close();
+              serverReady = false;
+@@ -705,12 +713,17 @@
+         URL url = new URL("https://localhost:" + serverPort+"/");
+         System.out.println("url is "+url.toString());
+ 
+-        http = (HttpsURLConnection)url.openConnection();
++        try {
++            http = (HttpsURLConnection)url.openConnection();
+ 
+-        int respCode = http.getResponseCode();
+-        System.out.println("respCode = "+respCode);
+-
+-        http.disconnect();
++            int respCode = http.getResponseCode();
++            System.out.println("respCode = "+respCode);
++        } finally {
++            if (http != null) {
++                http.disconnect();
++            }
++            closeReady = true;
++        }
+     }
+ 
+     /*
+diff -r 710c4493902f -r 89f4ec9e4b33 test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Identities.java
+--- openjdk-old/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Identities.java	Fri Apr 09 07:21:46 2010 -0700
++++ openjdk/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Identities.java	Sat Apr 10 09:13:12 2010 +0800
+@@ -624,6 +624,11 @@
+     volatile static boolean serverReady = false;
+ 
+     /*
++     * Is the connection ready to close?
++     */
++    volatile static boolean closeReady = false;
++
++    /*
+      * Turn on SSL debugging?
+      */
+     static boolean debug = false;
+@@ -671,7 +676,10 @@
+             out.flush();
+         } finally {
+              // close the socket
+-             Thread.sleep(2000);
++             while (!closeReady) {
++                 Thread.sleep(50);
++             }
++
+              System.out.println("Server closing socket");
+              sslSocket.close();
+              serverReady = false;
+@@ -704,12 +712,17 @@
+         URL url = new URL("https://localhost:" + serverPort+"/");
+         System.out.println("url is "+url.toString());
+ 
+-        http = (HttpsURLConnection)url.openConnection();
++        try {
++            http = (HttpsURLConnection)url.openConnection();
+ 
+-        int respCode = http.getResponseCode();
+-        System.out.println("respCode = "+respCode);
+-
+-        http.disconnect();
++            int respCode = http.getResponseCode();
++            System.out.println("respCode = "+respCode);
++        } finally {
++            if (http != null) {
++                http.disconnect();
++            }
++            closeReady = true;
++        }
+     }
+ 
+     /*
+diff -r 710c4493902f -r 89f4ec9e4b33 test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Redirect.java
+--- openjdk-old/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Redirect.java	Fri Apr 09 07:21:46 2010 -0700
++++ openjdk/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Redirect.java	Sat Apr 10 09:13:12 2010 +0800
+@@ -61,6 +61,11 @@
+     volatile static boolean serverReady = false;
+ 
+     /*
++     * Is the connection ready to close?
++     */
++    volatile static boolean closeReady = false;
++
++    /*
+      * Turn on SSL debugging?
+      */
+     static boolean debug = false;
+@@ -98,24 +103,33 @@
+         serverReady = true;
+ 
+         SSLSocket sslSocket = (SSLSocket) sslServerSocket.accept();
+-        InputStream sslIS = sslSocket.getInputStream();
+-        OutputStream sslOS = sslSocket.getOutputStream();
+-        BufferedReader br = new BufferedReader(new InputStreamReader(sslIS));
+-        PrintStream ps = new PrintStream(sslOS);
+-        // process HTTP POST request from client
+-        System.out.println("status line: "+br.readLine());
++        try {
++            InputStream sslIS = sslSocket.getInputStream();
++            OutputStream sslOS = sslSocket.getOutputStream();
++            BufferedReader br =
++                        new BufferedReader(new InputStreamReader(sslIS));
++            PrintStream ps = new PrintStream(sslOS);
+ 
+-        ps.println("HTTP/1.1 307 Redirect");
+-        ps.println("Location: https://localhost:"+serverPort+"/index.html\n\n");
+-        ps.flush();
+-        sslSocket = (SSLSocket) sslServerSocket.accept();
+-        sslOS = sslSocket.getOutputStream();
+-        ps = new PrintStream(sslOS);
+-        ps.println("HTTP/1.1 200 Redirect succeeded\n\n");
+-        ps.flush();
+-        Thread.sleep(2000);
+-        sslSocket.close();
+-        sslServerSocket.close();
++            // process HTTP POST request from client
++            System.out.println("status line: "+br.readLine());
++
++            ps.println("HTTP/1.1 307 Redirect");
++            ps.println("Location: https://localhost:" + serverPort +
++                                                            "/index.html\n\n");
++            ps.flush();
++            sslSocket = (SSLSocket) sslServerSocket.accept();
++            sslOS = sslSocket.getOutputStream();
++            ps = new PrintStream(sslOS);
++            ps.println("HTTP/1.1 200 Redirect succeeded\n\n");
++            ps.flush();
++        } finally {
++            // close the socket
++            while (!closeReady) {
++                Thread.sleep(50);
++            }
++            sslSocket.close();
++            sslServerSocket.close();
++        }
+     }
+ 
+     /*
+@@ -139,10 +153,14 @@
+         HttpsURLConnection.setDefaultHostnameVerifier(
+                                       new NameVerifier());
+         HttpsURLConnection http = (HttpsURLConnection)url.openConnection();
+-
+-        System.out.println("response header: "+http.getHeaderField(0));
+-        if (http.getResponseCode() != 200) {
+-            throw new RuntimeException("test Failed");
++        try {
++            System.out.println("response header: "+http.getHeaderField(0));
++            if (http.getResponseCode() != 200) {
++                throw new RuntimeException("test Failed");
++            }
++        } finally {
++            http.disconnect();
++            closeReady = true;
+         }
+     }
+ 
diff -r ccb45c2618bd -r 814f715ce323 patches/openjdk/6943219-failure-in-linux.patch
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/patches/openjdk/6943219-failure-in-linux.patch	Tue Dec 07 12:11:55 2010 +0100
@@ -0,0 +1,73 @@
+# HG changeset patch
+# User chegar
+# Date 1271345836 -3600
+# Node ID ed61accf772ed2eb2002f6100f3aa945ef05431b
+# Parent  1672f0212f025441f1ad058b72568c992a0c6e16
+6943219: test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java fail in linux
+Reviewed-by: andrew
+
+diff -r 1672f0212f02 -r ed61accf772e test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java
+--- openjdk-old/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java	Tue Apr 13 12:02:06 2010 +0100
++++ openjdk/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java	Thu Apr 15 16:37:16 2010 +0100
+@@ -657,9 +657,6 @@
+ 
+         SSLSocket sslSocket = (SSLSocket) sslServerSocket.accept();
+         sslSocket.setNeedClientAuth(true);
+-        if (sslSocket instanceof SSLSocketImpl) {
+-            ((SSLSocketImpl)sslSocket).trySetHostnameVerification("HTTPS");
+-        }
+ 
+         PrintStream out =
+                 new PrintStream(sslSocket.getOutputStream());
+diff -r 1672f0212f02 -r ed61accf772e test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java
+--- openjdk-old/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java	Tue Apr 13 12:02:06 2010 +0100
++++ openjdk/jdk/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java	Thu Apr 15 16:37:16 2010 +0100
+@@ -657,9 +657,6 @@



More information about the distro-pkg-dev mailing list