/hg/icedtea-web: 2 new changesets

adomurad at icedtea.classpath.org adomurad at icedtea.classpath.org
Tue Apr 23 09:29:49 PDT 2013


changeset 1bdcb1e255b5 in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=1bdcb1e255b5
author: Adam Domurad <adomurad at redhat.com>
date: Tue Apr 23 12:29:13 2013 -0400

	JNLPClassLoader unit tests for file leaks


changeset d5d3f8a62906 in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=d5d3f8a62906
author: Adam Domurad <adomurad at redhat.com>
date: Tue Apr 23 12:30:34 2013 -0400

	Ensure JarFile handles do not leak.


diffstat:

 ChangeLog                                                             |   17 +
 netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java                |   17 +-
 tests/netx/unit/net/sourceforge/jnlp/runtime/JNLPClassLoaderTest.java |  263 ++++++++++
 3 files changed, 293 insertions(+), 4 deletions(-)

diffs (371 lines):

diff -r 66b641f365b5 -r d5d3f8a62906 ChangeLog
--- a/ChangeLog	Tue Apr 23 11:10:24 2013 -0400
+++ b/ChangeLog	Tue Apr 23 12:30:34 2013 -0400
@@ -1,3 +1,20 @@
+2013-04-23  Adam Domurad  <adomurad at redhat.com>
+
+	Ensure JarFile handles do not leak.
+	* netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java:
+	Ensure close is called for each JarFile.
+
+2013-04-23  Adam Domurad  <adomurad at redhat.com>
+
+	* tests/netx/unit/net/sourceforge/jnlp/runtime/JNLPClassLoaderTest.java:
+	New, JNLPClassLoader unit tests for (checkForMain), (getMainClassName),
+	(activateNativeJar), and (isInvalidJar). Checks for file descriptor
+	leaks.
+	* netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
+	(isInvalidJar): Change to default visibility for testing purposes.
+	(checkForMain): Same.
+	(getMainClassName): Same. 
+
 2013-04-23  Adam Domurad  <adomurad at redhat.com>
 
 	Rewrite of MethodOverloadResolver with detailed unittests.
diff -r 66b641f365b5 -r d5d3f8a62906 netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
--- a/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java	Tue Apr 23 11:10:24 2013 -0400
+++ b/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java	Tue Apr 23 12:30:34 2013 -0400
@@ -556,7 +556,7 @@
      * @param jar the jar to check
      * @return true if file exists AND is an invalid jar, false otherwise
      */
-    private boolean isInvalidJar(JARDesc jar){
+    boolean isInvalidJar(JARDesc jar){
         File cacheFile = tracker.getCacheFile(jar.getLocation());
         if (cacheFile == null)
             return false;//File cannot be retrieved, do not claim it is an invalid jar
@@ -792,7 +792,7 @@
      * @param jars Jars that are checked to see if they contain the main class
      * @throws LaunchException Thrown if the signed JNLP file, within the main jar, fails to be verified or does not match
      */
-    private void checkForMain(List<JARDesc> jars) throws LaunchException {
+    void checkForMain(List<JARDesc> jars) throws LaunchException {
 
         // Check launch info
         if (mainClass == null) {
@@ -862,6 +862,8 @@
                         break;
                     }
                 }
+
+                jarFile.close();
             } catch (IOException e) {
                 /*
                  * After this exception is caught, it is escaped. This will skip
@@ -878,18 +880,21 @@
      * @param location The JAR location
      * @return the main class name, null if there isn't one of if there was an error
      */
-    private String getMainClassName(URL location) {
+    String getMainClassName(URL location) {
 
         String mainClass = null;
         File f = tracker.getCacheFile(location);
 
         if( f != null) {
+            JarFile mainJar = null;
             try {
-                JarFile mainJar = new JarFile(f);
+                mainJar = new JarFile(f);
                 mainClass = mainJar.getManifest().
                         getMainAttributes().getValue("Main-Class");
             } catch (IOException ioe) {
                 mainClass = null;
+            } finally {
+                StreamUtils.closeSilently(mainJar);
             }
         }
 
@@ -1305,6 +1310,7 @@
                                 jarEntries.add(je.getName());
                             }
 
+                            jarFile.close();
                         }
 
                         addURL(jar.getLocation());
@@ -1328,6 +1334,8 @@
                             JarIndex index = JarIndex.getJarIndex(jarFile, null);
                             if (index != null)
                                 jarIndexes.add(index);
+
+                            jarFile.close();
                         } else {
                             CachedJarFileCallback.getInstance().addMapping(jar.getLocation(), jar.getLocation());
                         }
@@ -1401,6 +1409,7 @@
                                      new FileOutputStream(outFile));
 
             }
+            jarFile.close();
         } catch (IOException ex) {
             if (JNLPRuntime.isDebug())
                 ex.printStackTrace();
diff -r 66b641f365b5 -r d5d3f8a62906 tests/netx/unit/net/sourceforge/jnlp/runtime/JNLPClassLoaderTest.java
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/tests/netx/unit/net/sourceforge/jnlp/runtime/JNLPClassLoaderTest.java	Tue Apr 23 12:30:34 2013 -0400
@@ -0,0 +1,263 @@
+/*Copyright (C) 2013 Red Hat, Inc.
+
+This file is part of IcedTea.
+
+IcedTea is free software; you can redistribute it and/or
+modify it under the terms of the GNU General Public License as published by
+the Free Software Foundation, version 2.
+
+IcedTea is distributed in the hope that it will be useful,
+but WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+General Public License for more details.
+
+You should have received a copy of the GNU General Public License
+along with IcedTea; see the file COPYING.  If not, write to
+the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+02110-1301 USA.
+
+Linking this library statically or dynamically with other modules is
+making a combined work based on this library.  Thus, the terms and
+conditions of the GNU General Public License cover the whole
+combination.
+
+As a special exception, the copyright holders of this library give you
+permission to link this library with independent modules to produce an
+executable, regardless of the license terms of these independent
+modules, and to copy and distribute the resulting executable under
+terms of your choice, provided that you also meet, for each linked
+independent module, the terms and conditions of the license of that
+module.  An independent module is a module which is not derived from
+or based on this library.  If you modify this library, you may extend
+this exception to your version of the library, but you are not
+obligated to do so.  If you do not wish to do so, delete this
+exception statement from your version.
+ */
+
+package net.sourceforge.jnlp.runtime;
+
+import static org.junit.Assert.assertEquals;
+import static org.junit.Assert.assertFalse;
+import static org.junit.Assert.fail;
+
+import java.io.File;
+import java.lang.management.ManagementFactory;
+import java.net.MalformedURLException;
+import java.net.URL;
+import java.util.ArrayList;
+import java.util.Arrays;
+import java.util.List;
+import java.util.Locale;
+
+import javax.management.MBeanServer;
+import javax.management.ObjectName;
+
+import net.sourceforge.jnlp.InformationDesc;
+import net.sourceforge.jnlp.JARDesc;
+import net.sourceforge.jnlp.JNLPFile;
+import net.sourceforge.jnlp.LaunchException;
+import net.sourceforge.jnlp.ResourcesDesc;
+import net.sourceforge.jnlp.SecurityDesc;
+import net.sourceforge.jnlp.ServerAccess;
+import net.sourceforge.jnlp.Version;
+import net.sourceforge.jnlp.cache.UpdatePolicy;
+import net.sourceforge.jnlp.util.StreamUtils;
+
+import org.junit.Test;
+
+public class JNLPClassLoaderTest {
+
+    /* Get the open file-descriptor count for the process.
+     * Note that this is specific to Unix-like operating systems.
+     * As well, it relies on */
+    static public long getOpenFileDescriptorCount() {
+        MBeanServer beanServer = ManagementFactory.getPlatformMBeanServer();
+        try {
+            return (Long) beanServer.getAttribute(
+                    new ObjectName("java.lang:type=OperatingSystem"), 
+                    "OpenFileDescriptorCount"
+            );
+        } catch (Exception e) {
+            // Effectively disables leak tests
+            ServerAccess.logErrorReprint("Warning: Cannot get file descriptors for this platform!");
+            return 0;
+        }
+    }
+
+    /* Check the amount of file descriptors before and after a Runnable */
+    static private void assertNoFileLeak(Runnable runnable) {
+        long filesOpenBefore = getOpenFileDescriptorCount();
+        runnable.run();
+        long filesLeaked = getOpenFileDescriptorCount() - filesOpenBefore;
+        assertEquals(0, filesLeaked);
+    }
+
+    static private String cleanExec(File directory, String... command) throws Exception {
+        Process p = Runtime.getRuntime().exec(command, new String[]{}, directory);
+
+        String stdOut = StreamUtils.readStreamAsString(p.getInputStream());
+        String stdErr = StreamUtils.readStreamAsString(p.getErrorStream());
+
+        ServerAccess.logNoReprint("Running " + Arrays.toString(command));
+        ServerAccess.logNoReprint("Standard output was: \n" + stdOut);
+        ServerAccess.logNoReprint("Standard error was: \n" + stdErr);
+
+        p.getInputStream().close();
+        p.getErrorStream().close();
+        p.getOutputStream().close();
+
+        return stdOut;
+
+    }
+
+    /* Creates a jar in a temporary directory, with the given name & manifest contents. */
+    static private File createTempJar(String jarName, String manifestContents) throws Exception {
+        File dir = new File(cleanExec(null /* current working dir */, "mktemp", "-d"));
+        cleanExec(dir, "/bin/bash", "-c", "echo '" + manifestContents + "' > Manifest.txt");
+        cleanExec(dir, "jar", "-cfm", jarName, "Manifest.txt");
+        return new File(dir.getAbsolutePath() + "/" + jarName);
+    }
+
+    /* Creates a jar in a temporary directory, with the given name & an empty manifest. */
+    static private File createTempJar(String jarName) throws Exception {
+        return createTempJar(jarName, "");
+    }
+
+    /* Create a JARDesc for the given URL location */
+    static private JARDesc makeJarDesc(URL jarLocation) {
+        return new JARDesc(jarLocation, new Version("1"), null, false,false, false,false);
+    }
+
+    /* A mocked dummy JNLP file with a single JAR. */
+    private class MockedOneJarJNLPFile extends JNLPFile {
+        URL codeBase, jarLocation;
+        JARDesc jarDesc;
+
+        MockedOneJarJNLPFile(File jarFile) throws MalformedURLException {
+            codeBase = jarFile.getParentFile().toURI().toURL();
+            jarLocation = jarFile.toURI().toURL();
+            jarDesc = makeJarDesc(jarLocation); 
+            info = new ArrayList<InformationDesc>();
+        }
+
+        @Override
+        public ResourcesDesc getResources() {
+            ResourcesDesc resources = new ResourcesDesc(null, new Locale[0], new String[0], new String[0]);
+            resources.addResource(jarDesc);
+            return resources;
+        }
+        @Override
+        public ResourcesDesc[] getResourcesDescs(final Locale locale, final String os, final String arch) {
+            return new ResourcesDesc[] { getResources() };
+        }
+
+        @Override
+        public URL getCodeBase() {
+            return codeBase;
+        }
+
+        @Override
+        public SecurityDesc getSecurity() {
+            return new SecurityDesc(this, SecurityDesc.SANDBOX_PERMISSIONS, null);
+        }
+    };
+
+    /* Note: Only does file leak testing for now. */
+    @Test
+    public void constructorFileLeakTest() throws Exception {
+        final MockedOneJarJNLPFile jnlpFile = new MockedOneJarJNLPFile(createTempJar("test.jar"));
+
+        assertNoFileLeak( new Runnable () {
+            @Override
+            public void run() {
+                try {
+                    new JNLPClassLoader(jnlpFile, UpdatePolicy.ALWAYS);
+                } catch (LaunchException e) {
+                    fail(e.toString());
+                }
+            }
+        });
+    }
+
+    /* Note: We should create a JNLPClassLoader with an invalid jar to test isInvalidJar with.
+     * However, it is tricky without it erroring-out. */
+    @Test
+    public void isInvalidJarTest() throws Exception {
+        final MockedOneJarJNLPFile jnlpFile = new MockedOneJarJNLPFile(createTempJar("test.jar"));
+        final JNLPClassLoader classLoader = new JNLPClassLoader(jnlpFile, UpdatePolicy.ALWAYS);
+
+        assertNoFileLeak( new Runnable () {
+            @Override
+            public void run() {
+                    assertFalse(classLoader.isInvalidJar(jnlpFile.jarDesc));
+            }
+        });
+
+    }
+
+    /* Note: Only does file leak testing for now, but more testing could be added. */
+    @Test
+    public void activateNativeFileLeakTest() throws Exception {
+        final MockedOneJarJNLPFile jnlpFile = new MockedOneJarJNLPFile(createTempJar("test.jar"));
+        final JNLPClassLoader classLoader = new JNLPClassLoader(jnlpFile, UpdatePolicy.ALWAYS);
+
+        assertNoFileLeak( new Runnable () {
+            @Override
+            public void run() {
+                    classLoader.activateNative(jnlpFile.jarDesc);
+            }
+        });
+    }
+    
+    @Test
+    public void getMainClassNameTest() throws Exception {
+        /* Test with main-class */{
+            final MockedOneJarJNLPFile jnlpFile = new MockedOneJarJNLPFile(createTempJar("test.jar", "Main-Class: DummyClass\n"));
+            final JNLPClassLoader classLoader = new JNLPClassLoader(jnlpFile, UpdatePolicy.ALWAYS);
+
+            assertNoFileLeak(new Runnable() {
+                @Override
+                public void run() {
+                    assertEquals("DummyClass", classLoader.getMainClassName(jnlpFile.jarLocation));
+                }
+            });
+        }
+        /* Test with-out main-class */{
+            final MockedOneJarJNLPFile jnlpFile = new MockedOneJarJNLPFile(createTempJar("test.jar", ""));
+            final JNLPClassLoader classLoader = new JNLPClassLoader(jnlpFile, UpdatePolicy.ALWAYS);
+
+            assertNoFileLeak(new Runnable() {
+                @Override
+                public void run() {
+                    assertEquals(null, classLoader.getMainClassName(jnlpFile.jarLocation));
+                }
+            });
+        }
+    }
+
+    static private <T> List<T> toList(T ... parts) {
+        List<T> list = new ArrayList<T>();
+        for (T part : parts) {
+            list.add(part);
+        }
+        return list;
+    }
+
+    /* Note: Although it does a basic check, this mainly checks for file-descriptor leak */
+    @Test
+    public void checkForMainFileLeakTest() throws Exception {
+        final MockedOneJarJNLPFile jnlpFile = new MockedOneJarJNLPFile(createTempJar("test.jar", ""));
+        final JNLPClassLoader classLoader = new JNLPClassLoader(jnlpFile, UpdatePolicy.ALWAYS);
+        assertNoFileLeak(new Runnable() {
+            @Override
+            public void run() {
+                try {
+                    classLoader.checkForMain(toList(jnlpFile.jarDesc));
+                } catch (LaunchException e) {
+                    fail(e.toString());
+                }
+            }
+         });
+        assertFalse(classLoader.hasMainJar());
+    }
+}
\ No newline at end of file



More information about the distro-pkg-dev mailing list