/hg/release/icedtea7-forest-2.2/jdk: 11 new changesets

andrew at icedtea.classpath.org andrew at icedtea.classpath.org
Tue Jun 12 15:53:37 PDT 2012


changeset b9d7476e0eae in /hg/release/icedtea7-forest-2.2/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.2/jdk?cmd=changeset;node=b9d7476e0eae
author: sherman
date: Tue Feb 28 15:44:47 2012 -0800

	7143606: File.createTempFile should be improved for temporary files created by the platform.
	Summary: To use java.nio.file.Files.createTempFile()
	Reviewed-by: alanb, ksrini, prr


changeset f7a5de28382d in /hg/release/icedtea7-forest-2.2/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.2/jdk?cmd=changeset;node=f7a5de28382d
author: rupashka
date: Mon Feb 27 20:18:28 2012 +0200

	7143614: SynthLookAndFeel stability improvement
	Reviewed-by: malenkov


changeset aa3f7fbfd96a in /hg/release/icedtea7-forest-2.2/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.2/jdk?cmd=changeset;node=aa3f7fbfd96a
author: bae
date: Wed Feb 15 10:59:12 2012 +0400

	7143617: Improve fontmanager layout lookup operations
	Reviewed-by: prr


changeset d4fe148e42b7 in /hg/release/icedtea7-forest-2.2/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.2/jdk?cmd=changeset;node=d4fe148e42b7
author: coffeys
date: Wed Feb 29 16:48:03 2012 +0000

	7143851: Improve IIOP stub and tie generation in RMIC
	7149048: Changes to corba rmic stubGenerator class are not used during jdk build process
	Reviewed-by: mschoene, dholmes


changeset 96638df1d51e in /hg/release/icedtea7-forest-2.2/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.2/jdk?cmd=changeset;node=96638df1d51e
author: weijun
date: Wed Feb 29 14:06:00 2012 +0800

	7143872: Improve certificate extension processing
	Reviewed-by: mullan


changeset ea77a2368a56 in /hg/release/icedtea7-forest-2.2/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.2/jdk?cmd=changeset;node=ea77a2368a56
author: mullan
date: Wed Jun 06 13:46:11 2012 +0100

	7145239: Finetune package definition restriction
	Reviewed-by: hawtin


changeset e6d2accdb996 in /hg/release/icedtea7-forest-2.2/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.2/jdk?cmd=changeset;node=e6d2accdb996
author: jrose
date: Mon May 07 01:22:07 2012 -0700

	7165628: Issues with java.lang.invoke.MethodHandles.Lookup
	Summary: Base SecurityManager checks on either of Lookup.lookupClass or caller class; also clarify Lookup access checks.
	Reviewed-by: twisti


changeset a9d2181de4ee in /hg/release/icedtea7-forest-2.2/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.2/jdk?cmd=changeset;node=a9d2181de4ee
author: andrew
date: Thu Jun 07 15:31:10 2012 +0100

	Added tag icedtea-2.2.1 for changeset e6d2accdb996


changeset c97939b0a3de in /hg/release/icedtea7-forest-2.2/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.2/jdk?cmd=changeset;node=c97939b0a3de
author: andrew
date: Fri Jun 08 14:08:09 2012 +0100

	Remove stray file.


changeset 1870f7528cbf in /hg/release/icedtea7-forest-2.2/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.2/jdk?cmd=changeset;node=1870f7528cbf
author: andrew
date: Fri Jun 08 14:08:57 2012 +0100

	Removed tag icedtea-2.2.1


changeset 6c3b742b735d in /hg/release/icedtea7-forest-2.2/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.2/jdk?cmd=changeset;node=6c3b742b735d
author: andrew
date: Fri Jun 08 14:09:13 2012 +0100

	Added tag icedtea-2.2.1 for changeset 1870f7528cbf


diffstat:

 .hgtags                                                                |   5 +
 jdk/test/sun/management/jmxremote/bootstrap/LocalOnlyTest.java         |  97 ----------
 make/com/sun/jmx/Makefile                                              |  19 +-
 src/macosx/classes/apple/applescript/AppleScriptEngine.java            |   3 +-
 src/share/classes/com/sun/java/util/jar/pack/Driver.java               |   5 +-
 src/share/classes/java/awt/Font.java                                   |   5 +-
 src/share/classes/java/lang/invoke/MethodHandles.java                  |  33 ++-
 src/share/classes/javax/imageio/stream/FileCacheImageInputStream.java  |   8 +-
 src/share/classes/javax/imageio/stream/FileCacheImageOutputStream.java |   8 +-
 src/share/classes/javax/management/loading/MLet.java                   |   6 +-
 src/share/classes/javax/swing/plaf/synth/SynthButtonUI.java            |   4 +-
 src/share/classes/javax/swing/plaf/synth/SynthLabelUI.java             |   4 +-
 src/share/classes/javax/swing/plaf/synth/SynthLookAndFeel.java         |  57 +++--
 src/share/classes/sun/invoke/util/VerifyAccess.java                    |  43 +++-
 src/share/classes/sun/print/PSPrinterJob.java                          |   3 +-
 src/share/classes/sun/rmi/server/Activation.java                       |   3 +-
 src/share/classes/sun/security/x509/CRLExtensions.java                 |   9 +-
 src/share/classes/sun/security/x509/CertificateExtensions.java         |  13 +-
 src/share/classes/sun/security/x509/X509CRLEntryImpl.java              |  52 ++++-
 src/share/classes/sun/security/x509/X509CRLImpl.java                   |  56 +++--
 src/share/classes/sun/security/x509/X509CertImpl.java                  |  22 +-
 src/share/classes/sun/tools/jar/Main.java                              |   2 +-
 src/share/classes/sun/tools/native2ascii/Main.java                     |   9 +-
 src/share/lib/security/java.security                                   |   8 +-
 src/share/lib/security/java.security-macosx                            |   8 +-
 src/share/lib/security/java.security-solaris                           |   6 +-
 src/share/lib/security/java.security-windows                           |   6 +-
 src/share/native/sun/font/layout/LookupProcessor.cpp                   |  15 +-
 src/share/native/sun/font/layout/LookupProcessor.h                     |   1 +
 src/solaris/classes/sun/font/FcFontConfiguration.java                  |   3 +-
 src/solaris/classes/sun/print/UnixPrintJob.java                        |   3 +-
 src/solaris/classes/sun/print/UnixPrintServiceLookup.java              |   3 +-
 32 files changed, 281 insertions(+), 238 deletions(-)

diffs (truncated from 1353 to 500 lines):

diff -r 839d0155f7cc -r 6c3b742b735d .hgtags
--- a/.hgtags	Wed May 30 22:19:42 2012 +0100
+++ b/.hgtags	Fri Jun 08 14:09:13 2012 +0100
@@ -174,3 +174,8 @@
 81a0f71a895e7f386efdd481eb53fb3ca0597438 jdk7u4-b30
 0573d282ca247a2848c26fe2800c7f3aa8d2e882 jdk7u4-b21
 ca871dbdbd7bb0224cc920c385575bcb73a2904c icedtea-2.2
+e6d2accdb996c704ff5c828a1035a48a057dde68 icedtea-2.2.1
+e6d2accdb996c704ff5c828a1035a48a057dde68 icedtea-2.2.1
+0000000000000000000000000000000000000000 icedtea-2.2.1
+0000000000000000000000000000000000000000 icedtea-2.2.1
+1870f7528cbf59c29224dab4ff84514aee20875e icedtea-2.2.1
diff -r 839d0155f7cc -r 6c3b742b735d jdk/test/sun/management/jmxremote/bootstrap/LocalOnlyTest.java
--- a/jdk/test/sun/management/jmxremote/bootstrap/LocalOnlyTest.java	Wed May 30 22:19:42 2012 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,97 +0,0 @@
-/*
- * Copyright 2007 Sun Microsystems, Inc.  All Rights Reserved.
- * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
- *
- * This code is free software; you can redistribute it and/or modify it
- * under the terms of the GNU General Public License version 2 only, as
- * published by the Free Software Foundation.
- *
- * This code is distributed in the hope that it will be useful, but WITHOUT
- * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
- * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
- * version 2 for more details (a copy is included in the LICENSE file that
- * accompanied this code).
- *
- * You should have received a copy of the GNU General Public License version
- * 2 along with this work; if not, write to the Free Software Foundation,
- * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
- *
- * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
- * CA 95054 USA or visit www.sun.com if you need additional information or
- * have any questions.
- */
-
-/*
- * @test
- * @bug 6685178
- * @summary Sanity check for local only option. In order to fully test this
- *          new local only option two different machines would be required.
- * @author Luis-Miguel Alventosa
- * @run main/othervm LocalOnlyTest
- * @run main/othervm -Dcom.sun.management.jmxremote.local.only=true LocalOnlyTest
- * @run main/othervm -Dcom.sun.management.jmxremote.local.only=false LocalOnlyTest
- * @run main/othervm -Dcom.sun.management.jmxremote LocalOnlyTest
- * @run main/othervm -Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.local.only=true LocalOnlyTest
- * @run main/othervm -Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.local.only=false LocalOnlyTest
- * @run main/othervm -Dcom.sun.management.jmxremote.port=0 -Dcom.sun.management.jmxremote.authenticate=false -Dcom.sun.management.jmxremote.ssl=false LocalOnlyTest
- * @run main/othervm -Dcom.sun.management.jmxremote.port=0 -Dcom.sun.management.jmxremote.authenticate=false -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.local.only=true LocalOnlyTest
- * @run main/othervm -Dcom.sun.management.jmxremote.port=0 -Dcom.sun.management.jmxremote.authenticate=false -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.local.only=false LocalOnlyTest
- */
-
-import java.io.*;
-import java.lang.management.*;
-import java.util.*;
-import javax.management.*;
-import javax.management.remote.*;
-import com.sun.tools.attach.*;
-
-public class LocalOnlyTest {
-
-    public static void main(String args[]) throws Exception {
-        RuntimeMXBean rt = ManagementFactory.getRuntimeMXBean();
-        String name = rt.getName();
-        System.out.println("name = " + name);
-        String vmid = name.substring(0, name.indexOf("@"));
-        System.out.println("vmid = " + vmid);
-        VirtualMachine vm = VirtualMachine.attach(vmid);
-        String addr = vm.getAgentProperties().getProperty(
-                "com.sun.management.jmxremote.localConnectorAddress");
-        System.out.println("connectorAddress = " + addr);
-        if (addr == null) {
-            // Normally in ${java.home}/jre/lib/management-agent.jar
-            // but might be in ${java.home}/lib in build environments.
-            String javaHome = System.getProperty("java.home");
-            String agent = javaHome + File.separator + "jre" + File.separator +
-                    "lib" + File.separator + "management-agent.jar";
-            File f = new File(agent);
-            if (!f.exists()) {
-                agent = javaHome + File.separator + "lib" + File.separator +
-                        "management-agent.jar";
-                f = new File(agent);
-                if (!f.exists()) {
-                    throw new IOException("Management agent not found");
-                }
-            }
-            agent = f.getCanonicalPath();
-            try {
-                vm.loadAgent(agent, "com.sun.management.jmxremote");
-            } catch (AgentLoadException x) {
-                IOException ioe = new IOException(x.getMessage());
-                ioe.initCause(x);
-                throw ioe;
-            } catch (AgentInitializationException x) {
-                IOException ioe = new IOException(x.getMessage());
-                ioe.initCause(x);
-                throw ioe;
-            }
-            addr = vm.getAgentProperties().getProperty(
-                    "com.sun.management.jmxremote.localConnectorAddress");
-            System.out.println("connectorAddress (after loading agent) = " + addr);
-        }
-        vm.detach();
-        JMXServiceURL url = new JMXServiceURL(addr);
-        JMXConnector c = JMXConnectorFactory.connect(url);
-        System.out.println("connectionId  = " + c.getConnectionId());
-        System.out.println("Bye! Bye!");
-    }
-}
diff -r 839d0155f7cc -r 6c3b742b735d make/com/sun/jmx/Makefile
--- a/make/com/sun/jmx/Makefile	Wed May 30 22:19:42 2012 +0100
+++ b/make/com/sun/jmx/Makefile	Fri Jun 08 14:09:13 2012 +0100
@@ -1,5 +1,5 @@
 #
-# Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
+# Copyright (c) 2003, 2012, Oracle and/or its affiliates. All rights reserved.
 # DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 #
 # This code is free software; you can redistribute it and/or modify it
@@ -100,6 +100,23 @@
 # so that *_tie classes are generated in package without the prefix
 # org.omg.stub (6375696)
 # 
+# To ensure the latest stub generator files are picked up from corba repo
+# when available, we need to run with latest rmic version available. rmic 
+# launch tool not built at this stage but we can invoke via rmi class.
+
+RMIC_JAVA = $(OUTPUTDIR)/bin/java
+# need to treat 64bit solaris differently
+ifeq ($(PLATFORM)-$(LIBARCH), solaris-amd64)
+RMIC_JAVA = $(OUTPUTDIR)/bin/amd64/java
+endif
+ifeq ($(PLATFORM)-$(LIBARCH), solaris-sparcv9)
+RMIC_JAVA = $(OUTPUTDIR)/bin/sparcv9/java
+endif
+
+ifeq ($(CROSS_COMPILE_ARCH),)
+RMIC = $(RMIC_JAVA) $(JAVA_TOOLS_FLAGS) -cp $(OUTPUTDIR)/classes sun.rmi.rmic.Main
+endif  
+
 $(CLASSDESTDIR)/%_Stub.class: $(CLASSDESTDIR)/%.class
 	$(prep-target)
 	$(RMIC) -classpath "$(CLASSDESTDIR)"    \
diff -r 839d0155f7cc -r 6c3b742b735d src/macosx/classes/apple/applescript/AppleScriptEngine.java
--- a/src/macosx/classes/apple/applescript/AppleScriptEngine.java	Wed May 30 22:19:42 2012 +0100
+++ b/src/macosx/classes/apple/applescript/AppleScriptEngine.java	Fri Jun 08 14:09:13 2012 +0100
@@ -26,6 +26,7 @@
 package apple.applescript;
 
 import java.io.*;
+import java.nio.file.Files;
 import java.util.*;
 import java.util.Map.Entry;
 
@@ -297,7 +298,7 @@
         File tmpfile;
         FileWriter tmpwrite;
         try {
-            tmpfile = File.createTempFile("AppleScriptEngine.", ".scpt");
+            tmpfile = Files.createTempFile("AppleScriptEngine.", ".scpt").toFile();
             tmpwrite = new FileWriter(tmpfile);
 
             // read in our input and write directly to tmpfile
diff -r 839d0155f7cc -r 6c3b742b735d src/share/classes/com/sun/java/util/jar/pack/Driver.java
--- a/src/share/classes/com/sun/java/util/jar/pack/Driver.java	Wed May 30 22:19:42 2012 +0100
+++ b/src/share/classes/com/sun/java/util/jar/pack/Driver.java	Fri Jun 08 14:09:13 2012 +0100
@@ -35,6 +35,7 @@
 import java.io.OutputStream;
 import java.io.PrintStream;
 import java.text.MessageFormat;
+import java.nio.file.Files;
 import java.util.ArrayList;
 import java.util.Arrays;
 import java.util.HashMap;
@@ -385,9 +386,7 @@
         if ( base.getParentFile() == null && suffix.equals(".bak"))
             where = new File(".").getAbsoluteFile();
 
-
-        File f = File.createTempFile(prefix, suffix, where);
-        return f;
+        return Files.createTempFile(where.toPath(), prefix, suffix).toFile();
     }
 
     static private
diff -r 839d0155f7cc -r 6c3b742b735d src/share/classes/java/awt/Font.java
--- a/src/share/classes/java/awt/Font.java	Wed May 30 22:19:42 2012 +0100
+++ b/src/share/classes/java/awt/Font.java	Fri Jun 08 14:09:13 2012 +0100
@@ -36,6 +36,7 @@
 import java.awt.peer.FontPeer;
 import java.io.*;
 import java.lang.ref.SoftReference;
+import java.nio.file.Files;
 import java.security.AccessController;
 import java.security.PrivilegedExceptionAction;
 import java.text.AttributedCharacterIterator.Attribute;
@@ -830,7 +831,7 @@
         File f = null;
         boolean hasPerm = false;
         try {
-            f = File.createTempFile("+~JT", ".tmp", null);
+            f = Files.createTempFile("+~JT", ".tmp").toFile();
             f.delete();
             f = null;
             hasPerm = true;
@@ -880,7 +881,7 @@
             final File tFile = AccessController.doPrivileged(
                 new PrivilegedExceptionAction<File>() {
                     public File run() throws IOException {
-                        return File.createTempFile("+~JF", ".tmp", null);
+                        return Files.createTempFile("+~JF", ".tmp").toFile();
                     }
                 }
             );
diff -r 839d0155f7cc -r 6c3b742b735d src/share/classes/java/lang/invoke/MethodHandles.java
--- a/src/share/classes/java/lang/invoke/MethodHandles.java	Wed May 30 22:19:42 2012 +0100
+++ b/src/share/classes/java/lang/invoke/MethodHandles.java	Fri Jun 08 14:09:13 2012 +0100
@@ -407,7 +407,7 @@
          * an access$N method.
          */
         Lookup() {
-            this(getCallerClassAtEntryPoint(), ALL_MODES);
+            this(getCallerClassAtEntryPoint(false), ALL_MODES);
             // make sure we haven't accidentally picked up a privileged class:
             checkUnprivilegedlookupClass(lookupClass);
         }
@@ -461,8 +461,8 @@
                 && !VerifyAccess.isSamePackageMember(this.lookupClass, requestedLookupClass)) {
                 newModes &= ~PRIVATE;
             }
-            if (newModes == PUBLIC
-                && !VerifyAccess.isClassAccessible(requestedLookupClass, this.lookupClass)) {
+            if ((newModes & PUBLIC) != 0
+                && !VerifyAccess.isClassAccessible(requestedLookupClass, this.lookupClass, allowedModes)) {
                 // The requested class it not accessible from the lookup class.
                 // No permissions.
                 newModes = 0;
@@ -540,13 +540,17 @@
             }
         }
 
-        // call this from an entry point method in Lookup with extraFrames=0.
-        private static Class<?> getCallerClassAtEntryPoint() {
+        /* Obtain the external caller class, when called from Lookup.<init> or a first-level subroutine. */
+        private static Class<?> getCallerClassAtEntryPoint(boolean inSubroutine) {
             final int CALLER_DEPTH = 4;
+            //  Stack for the constructor entry point (inSubroutine=false):
             // 0: Reflection.getCC, 1: getCallerClassAtEntryPoint,
             // 2: Lookup.<init>, 3: MethodHandles.*, 4: caller
+            //  The stack is slightly different for a subroutine of a Lookup.find* method:
+            // 2: Lookup.*, 3: Lookup.find*.*, 4: caller
             // Note:  This should be the only use of getCallerClass in this file.
-            assert(Reflection.getCallerClass(CALLER_DEPTH-1) == MethodHandles.class);
+            assert(Reflection.getCallerClass(CALLER_DEPTH-2) == Lookup.class);
+            assert(Reflection.getCallerClass(CALLER_DEPTH-1) == (inSubroutine ? Lookup.class : MethodHandles.class));
             return Reflection.getCallerClass(CALLER_DEPTH);
         }
 
@@ -1086,7 +1090,7 @@
 
         void checkSymbolicClass(Class<?> refc) throws IllegalAccessException {
             Class<?> caller = lookupClassOrNull();
-            if (caller != null && !VerifyAccess.isClassAccessible(refc, caller))
+            if (caller != null && !VerifyAccess.isClassAccessible(refc, caller, allowedModes))
                 throw new MemberName(refc).makeAccessException("symbolic reference class is not public", this);
         }
 
@@ -1101,7 +1105,13 @@
             // Step 1:
             smgr.checkMemberAccess(refc, Member.PUBLIC);
             // Step 2:
-            if (!VerifyAccess.classLoaderIsAncestor(lookupClass, refc))
+            Class<?> callerClass = ((allowedModes & PRIVATE) != 0
+                                    ? lookupClass  // for strong access modes, no extra check
+                                    // next line does stack walk magic; do not refactor:
+                                    : getCallerClassAtEntryPoint(true));
+            if (!VerifyAccess.classLoaderIsAncestor(lookupClass, refc) ||
+                (callerClass != lookupClass &&
+                 !VerifyAccess.classLoaderIsAncestor(callerClass, refc)))
                 smgr.checkPackageAccess(VerifyAccess.getPackageName(refc));
             // Step 3:
             if (m.isPublic()) return;
@@ -1152,9 +1162,10 @@
             int requestedModes = fixmods(mods);  // adjust 0 => PACKAGE
             if ((requestedModes & allowedModes) != 0
                 && VerifyAccess.isMemberAccessible(refc, m.getDeclaringClass(),
-                                                   mods, lookupClass()))
+                                                   mods, lookupClass(), allowedModes))
                 return;
             if (((requestedModes & ~allowedModes) & PROTECTED) != 0
+                && (allowedModes & PACKAGE) != 0
                 && VerifyAccess.isSamePackage(m.getDeclaringClass(), lookupClass()))
                 // Protected members can also be checked as if they were package-private.
                 return;
@@ -1169,9 +1180,9 @@
                                (defc == refc ||
                                 Modifier.isPublic(refc.getModifiers())));
             if (!classOK && (allowedModes & PACKAGE) != 0) {
-                classOK = (VerifyAccess.isClassAccessible(defc, lookupClass()) &&
+                classOK = (VerifyAccess.isClassAccessible(defc, lookupClass(), ALL_MODES) &&
                            (defc == refc ||
-                            VerifyAccess.isClassAccessible(refc, lookupClass())));
+                            VerifyAccess.isClassAccessible(refc, lookupClass(), ALL_MODES)));
             }
             if (!classOK)
                 return "class is not public";
diff -r 839d0155f7cc -r 6c3b742b735d src/share/classes/javax/imageio/stream/FileCacheImageInputStream.java
--- a/src/share/classes/javax/imageio/stream/FileCacheImageInputStream.java	Wed May 30 22:19:42 2012 +0100
+++ b/src/share/classes/javax/imageio/stream/FileCacheImageInputStream.java	Fri Jun 08 14:09:13 2012 +0100
@@ -29,6 +29,7 @@
 import java.io.InputStream;
 import java.io.IOException;
 import java.io.RandomAccessFile;
+import java.nio.file.Files;
 import com.sun.imageio.stream.StreamCloser;
 import com.sun.imageio.stream.StreamFinalizer;
 import sun.java2d.Disposer;
@@ -97,8 +98,11 @@
             throw new IllegalArgumentException("Not a directory!");
         }
         this.stream = stream;
-        this.cacheFile =
-            File.createTempFile("imageio", ".tmp", cacheDir);
+        if (cacheDir == null)
+            this.cacheFile = Files.createTempFile("imageio", ".tmp").toFile();
+        else
+            this.cacheFile = Files.createTempFile(cacheDir.toPath(), "imageio", ".tmp")
+                                  .toFile();
         this.cache = new RandomAccessFile(cacheFile, "rw");
 
         this.closeAction = StreamCloser.createCloseAction(this);
diff -r 839d0155f7cc -r 6c3b742b735d src/share/classes/javax/imageio/stream/FileCacheImageOutputStream.java
--- a/src/share/classes/javax/imageio/stream/FileCacheImageOutputStream.java	Wed May 30 22:19:42 2012 +0100
+++ b/src/share/classes/javax/imageio/stream/FileCacheImageOutputStream.java	Fri Jun 08 14:09:13 2012 +0100
@@ -29,6 +29,7 @@
 import java.io.IOException;
 import java.io.OutputStream;
 import java.io.RandomAccessFile;
+import java.nio.file.Files;
 import com.sun.imageio.stream.StreamCloser;
 
 /**
@@ -83,8 +84,11 @@
             throw new IllegalArgumentException("Not a directory!");
         }
         this.stream = stream;
-        this.cacheFile =
-            File.createTempFile("imageio", ".tmp", cacheDir);
+        if (cacheDir == null)
+            this.cacheFile = Files.createTempFile("imageio", ".tmp").toFile();
+        else
+            this.cacheFile = Files.createTempFile(cacheDir.toPath(), "imageio", ".tmp")
+                                  .toFile();
         this.cache = new RandomAccessFile(cacheFile, "rw");
 
         this.closeAction = StreamCloser.createCloseAction(this);
diff -r 839d0155f7cc -r 6c3b742b735d src/share/classes/javax/management/loading/MLet.java
--- a/src/share/classes/javax/management/loading/MLet.java	Wed May 30 22:19:42 2012 +0100
+++ b/src/share/classes/javax/management/loading/MLet.java	Fri Jun 08 14:09:13 2012 +0100
@@ -44,6 +44,7 @@
 import java.net.MalformedURLException;
 import java.net.URL;
 import java.net.URLStreamHandlerFactory;
+import java.nio.file.Files;
 import java.security.AccessController;
 import java.security.PrivilegedAction;
 import java.util.ArrayList;
@@ -1160,8 +1161,9 @@
                  try {
                      File directory = new File(libraryDirectory);
                      directory.mkdirs();
-                     File file = File.createTempFile(libname + ".", null,
-                             directory);
+                     File file = Files.createTempFile(directory.toPath(),
+                                                      libname + ".", null)
+                                      .toFile();
                      file.deleteOnExit();
                      FileOutputStream fileOutput = new FileOutputStream(file);
                      try {
diff -r 839d0155f7cc -r 6c3b742b735d src/share/classes/javax/swing/plaf/synth/SynthButtonUI.java
--- a/src/share/classes/javax/swing/plaf/synth/SynthButtonUI.java	Wed May 30 22:19:42 2012 +0100
+++ b/src/share/classes/javax/swing/plaf/synth/SynthButtonUI.java	Fri Jun 08 14:09:13 2012 +0100
@@ -152,8 +152,8 @@
         if (!c.isEnabled()) {
             state = DISABLED;
         }
-        if (SynthLookAndFeel.selectedUI == this) {
-            return SynthLookAndFeel.selectedUIState | SynthConstants.ENABLED;
+        if (SynthLookAndFeel.getSelectedUI() == this) {
+            return SynthLookAndFeel.getSelectedUIState() | SynthConstants.ENABLED;
         }
         AbstractButton button = (AbstractButton) c;
         ButtonModel model = button.getModel();
diff -r 839d0155f7cc -r 6c3b742b735d src/share/classes/javax/swing/plaf/synth/SynthLabelUI.java
--- a/src/share/classes/javax/swing/plaf/synth/SynthLabelUI.java	Wed May 30 22:19:42 2012 +0100
+++ b/src/share/classes/javax/swing/plaf/synth/SynthLabelUI.java	Fri Jun 08 14:09:13 2012 +0100
@@ -97,9 +97,9 @@
 
     private int getComponentState(JComponent c) {
         int state = SynthLookAndFeel.getComponentState(c);
-        if (SynthLookAndFeel.selectedUI == this &&
+        if (SynthLookAndFeel.getSelectedUI() == this &&
                         state == SynthConstants.ENABLED) {
-            state = SynthLookAndFeel.selectedUIState | SynthConstants.ENABLED;
+            state = SynthLookAndFeel.getSelectedUIState() | SynthConstants.ENABLED;
         }
         return state;
     }
diff -r 839d0155f7cc -r 6c3b742b735d src/share/classes/javax/swing/plaf/synth/SynthLookAndFeel.java
--- a/src/share/classes/javax/swing/plaf/synth/SynthLookAndFeel.java	Wed May 30 22:19:42 2012 +0100
+++ b/src/share/classes/javax/swing/plaf/synth/SynthLookAndFeel.java	Fri Jun 08 14:09:13 2012 +0100
@@ -76,27 +76,25 @@
     private static final Object STYLE_FACTORY_KEY = new Object(); // com.sun.java.swing.plaf.gtk.StyleCache
 
     /**
+     * AppContext key to get selectedUI.
+     */
+    private static final Object SELECTED_UI_KEY = new StringBuilder("selectedUI");
+
+    /**
+     * AppContext key to get selectedUIState.
+     */
+    private static final Object SELECTED_UI_STATE_KEY = new StringBuilder("selectedUIState");
+
+    /**
      * The last SynthStyleFactory that was asked for from AppContext
      * <code>lastContext</code>.
      */
     private static SynthStyleFactory lastFactory;
     /**
-     * If this is true it indicates there is more than one AppContext active
-     * and that we need to make sure in getStyleCache the requesting
-     * AppContext matches that of <code>lastContext</code> before returning
-     * it.
-     */
-    private static boolean multipleApps;
-    /**
      * AppContext lastLAF came from.
      */
     private static AppContext lastContext;
 
-    // Refer to setSelectedUI
-    static ComponentUI selectedUI;
-    // Refer to setSelectedUI
-    static int selectedUIState;
-
     /**
      * SynthStyleFactory for the this SynthLookAndFeel.
      */
@@ -110,6 +108,10 @@
 
     private Handler _handler;
 
+    static ComponentUI getSelectedUI() {
+        return (ComponentUI) AppContext.getAppContext().get(SELECTED_UI_KEY);
+    }
+
     /**
      * Used by the renderers. For the most part the renderers are implemented
      * as Labels, which is problematic in so far as they are never selected.
@@ -121,8 +123,8 @@
     static void setSelectedUI(ComponentUI uix, boolean selected,
                               boolean focused, boolean enabled,
                               boolean rollover) {
-        selectedUI = uix;
-        selectedUIState = 0;
+        int selectedUIState = 0;
+
         if (selected) {
             selectedUIState = SynthConstants.SELECTED;
             if (focused) {
@@ -139,19 +141,32 @@
         else {
             if (enabled) {
                 selectedUIState |= SynthConstants.ENABLED;
-                selectedUIState = SynthConstants.FOCUSED;
+                if (focused) {
+                    selectedUIState |= SynthConstants.FOCUSED;
+                }
             }
             else {
                 selectedUIState |= SynthConstants.DISABLED;
             }
         }
+
+        AppContext context = AppContext.getAppContext();
+
+        context.put(SELECTED_UI_KEY, uix);
+        context.put(SELECTED_UI_STATE_KEY, Integer.valueOf(selectedUIState));
+    }
+
+    static int getSelectedUIState() {
+        Integer result = (Integer) AppContext.getAppContext().get(SELECTED_UI_STATE_KEY);
+
+        return result == null ? 0 : result.intValue();
     }



More information about the distro-pkg-dev mailing list