/hg/release/icedtea-web-1.6: 4 new changesets
jvanek at icedtea.classpath.org
jvanek at icedtea.classpath.org
Thu Jan 7 14:38:09 UTC 2016
changeset 97d5dcfd9ec0 in /hg/release/icedtea-web-1.6
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.6?cmd=changeset;node=97d5dcfd9ec0
author: Jiri Vanek <jvanek at redhat.com>
date: Thu Jan 07 12:17:43 2016 +0100
fixed R2690 - Can't run BOM into JNLP file
changeset 0d9faf51357d in /hg/release/icedtea-web-1.6
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.6?cmd=changeset;node=0d9faf51357d
author: Jiri Vanek <jvanek at redhat.com>
date: Thu Jan 07 14:46:46 2016 +0100
Codebase resolution of jnlp-href is now aligned with oracle plugin
changeset 090ff301b57d in /hg/release/icedtea-web-1.6
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.6?cmd=changeset;node=090ff301b57d
author: Jiri Vanek <jvanek at redhat.com>
date: Thu Jan 07 15:24:21 2016 +0100
Fixed 2714 - IcedTea-Web plugin sends uninitialized memory garbage across a pipe when NPN_GetValueForURL call
Resolves an issue where, if IcedTea-Web's call to NPN_GetValueForURL fails, IcedTea-Web attempts to send uninitialized memory garbage across a pipe, which (usually) results in an error. At this point, IcedTea gives up, but does not inform Firefox that it has done so, and unless dom.ipc.plugins.asyncInit is true, this causes Firefox's UI to lock up in addition to the Java component failing to
changeset 834746c2a271 in /hg/release/icedtea-web-1.6
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.6?cmd=changeset;node=834746c2a271
author: Jiri Vanek <jvanek at redhat.com>
date: Thu Jan 07 15:33:12 2016 +0100
Remove bash-specifics from top level Makefile.am
The == in the test comparison is not necessary, the = test works fine.
Invoke html-gen.sh with 'sh' as opposed to 'bash' since it does not require
bash. No reason to require bash when it is not needed. Tested with dash
and zsh installed as /bin/sh.
diffstat:
ChangeLog | 58 +++++++
Makefile.am | 4 +-
NEWS | 4 +
netx/net/sourceforge/jnlp/PluginBridge.java | 8 +-
netx/net/sourceforge/jnlp/SecurityDesc.java | 6 +-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java | 49 +-----
netx/net/sourceforge/jnlp/util/UrlUtils.java | 58 +++++++
netx/net/sourceforge/nanoxml/XMLElement.java | 81 +++++++--
plugin/icedteanp/IcedTeaNPPlugin.cc | 14 +-
tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java | 19 ++
tests/netx/unit/net/sourceforge/jnlp/PluginBridgeTest.java | 2 -
tests/netx/unit/net/sourceforge/jnlp/runtime/CodeBaseClassLoaderTest.java | 8 +-
tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java | 17 +-
tests/netx/unit/net/sourceforge/jnlp/templates/EFBBBF.jnlp | 59 +++++++
tests/netx/unit/net/sourceforge/jnlp/util/UrlUtilsTest.java | 56 ++++++-
15 files changed, 351 insertions(+), 92 deletions(-)
diffs (truncated from 745 to 500 lines):
diff -r 486f0dc7b5ca -r 834746c2a271 ChangeLog
--- a/ChangeLog Wed Jan 06 17:34:03 2016 +0100
+++ b/ChangeLog Thu Jan 07 15:33:12 2016 +0100
@@ -1,3 +1,61 @@
+2016-01-07 David Cantrell <david.l.cantrell at gmail.com>
+ Jiri Vanek <jvanek at redhat.com>
+ Andrew John Hughes <ahughes at redhat.com>
+
+ Remove bash-specifics from top level Makefile.a
+ * Makefile.am: (generate-docs.stamp) double == in test function replaced by single =
+ (stamps/netx-html-gen.stamp) call to plain bash replaced by ${SHELL}
+ * NEWS: mentioned PR2669
+
+2016-01-07 Tiago Stürmer Daitx <tdaitx at gmail.com>
+ Jiri Vanek <jvanek at redhat.com>
+
+ Resolves an issue where, if IcedTea's call to NPN_GetValueForURL fails,
+ IcedTea-Web attempts to send uninitialized memory garbage across a pipe, which
+ (usually) results in an error. At this point, IcedTea gives up, but does not
+ inform Firefox that it has done so, and unless dom.ipc.plugins.asyncInit is
+ true, this causes Firefox's UI to lock up in addition to the Java component failing to load.
+ * plugin/icedteanp/IcedTeaNPPlugin.cc: (onsume_plugin_message) initialize len
+ and proxy_info. (get_proxy_info) returns correct message if
+ browser_functions.getvalueforurl returns error
+ * NEWS: mentioned PR2714
+
+2016-01-07 Jiri Vanek <jvanek at redhat.com>
+
+ Codebase resolution of jnlp-href is now aligned with oracle plugin
+ * netx/net/sourceforge/jnlp/PluginBridge.java: When jnlp href is used, codebase
+ is forced to become codebase of jnlp
+ * netx/net/sourceforge/jnlp/SecurityDesc.java: When file.getCodeBase() is null
+ then instead of NPE, codebase of file.fileLocation is used
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java:
+ stripFile and ensureSlashTail moved to UrlUtils
+ * netx/net/sourceforge/jnlp/util/UrlUtils.java: stripFile and ensureSlashTail
+ moved from UnsignedAppletTrustConfirmation
+ * tests/netx/unit/net/sourceforge/jnlp/PluginBridgeTest.java: removed empty lines
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java:
+ adapted to moved methods
+ * tests/netx/unit/net/sourceforge/jnlp/util/UrlUtilsTest.java: added more tests
+ to removeFileName and enabled accidentlay disabled getHostAndPortTest and
+ getPortTest
+ * tests/netx/unit/net/sourceforge/jnlp/runtime/CodeBaseClassLoaderTest.java:
+ ensured manifest attributes are off for this test
+ * tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java: fixed bom tests
+ to use proper classloader
+
+2016-01-07 Jiri Vanek <jvanek at redhat.com>
+
+ BOM character now dont cause error
+ * netx/net/sourceforge/nanoxml/XMLElement.java: duplicated whitespace recognition
+ code moved to isRegularWhiteSpace. First call to scanWhitespace repalced by
+ call to scanLeadingWhitespace. New field BOM introduced. (scanWhitespace)
+ made private, and uses isRegularWhiteSpace. (scanLeadingWhitespace) new method,
+ same as scanWhitespacebut also skipps BOM and marks it.
+ * tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java: Added tests to
+ issue
+ * tests/netx/unit/net/sourceforge/jnlp/templates/EFBBBF.jnlp: new file. jnlp
+ file starting with bom.
+ * NEWS: mentioned PR2690
+
2016-01-06 James Le Cuirot <chewi at gentoo.org>
Fixed typo in javadoc generation
diff -r 486f0dc7b5ca -r 834746c2a271 Makefile.am
--- a/Makefile.am Wed Jan 06 17:34:03 2016 +0100
+++ b/Makefile.am Thu Jan 07 15:33:12 2016 +0100
@@ -531,7 +531,7 @@
$$TP_COMMAND html "$$HTML_DOCS_TARGET_DIR/$$ID" $$TP_TAIL ; \
mkdir "$$PLAIN_DOCS_TARGET_DIR/$$ID" ; \
$$TP_COMMAND plain "$$PLAIN_DOCS_TARGET_DIR/$$ID" 160 $$TP_TAIL; \
- if [ $$ID == "en" ] ; then \
+ if [ $$ID = "en" ] ; then \
MAN_DESC="$$MAN_DOCS_TARGET_DIR/man1" ; \
else \
MAN_DESC="$$MAN_DOCS_TARGET_DIR/$$ID/man1" ; \
@@ -549,7 +549,7 @@
mkdir -p html-gen; \
cp AUTHORS NEWS COPYING ChangeLog html-gen/; \
export HTML_GEN_DEBUG=true; \
- bash html-gen.sh 40; \
+ ${SHELL} html-gen.sh 40; \
unset HTML_GEN_DEBUG)
${INSTALL_DATA} $(NETX_SRCDIR)/../html-gen/*.html $(NETX_RESOURCE_DIR)
rm -r $(NETX_SRCDIR)/../html-gen/
diff -r 486f0dc7b5ca -r 834746c2a271 NEWS
--- a/NEWS Wed Jan 06 17:34:03 2016 +0100
+++ b/NEWS Thu Jan 07 15:33:12 2016 +0100
@@ -12,11 +12,15 @@
* all connection restrictions now consider also port
* PR2779: html-gen.sh: Don't try to call hg if .hg directory isn't present
* PR2591 - IcedTea-Web request resources twice for meta informations and causes ClientAbortException on tomcat in conjunction with JnlpDownloadServlet
+* PR2690 - Can't run BOM into JNLP file
+* PR2669 - remove bash-specific syntax from top level Makefile.am
* NetX
- main-class attribute trimmed by default
- in strict mode, main-class attribute checked for invalid characters
* Plugin
- RH1273691 - Escaped equals signs in deployment.properties not un-escaped when used
+ - PR2746 - IcedTea-Web Plugin 1.6.1: net.sourceforge.jnlp.LaunchException
+ - PR2714 - IcedTea-Web plugin sends uninitialized memory garbage across a pipe when NPN_GetValueForURL call fails
New in release 1.6.1 (2015-09-11):
* Enabled Entry-Point attribute check
diff -r 486f0dc7b5ca -r 834746c2a271 netx/net/sourceforge/jnlp/PluginBridge.java
--- a/netx/net/sourceforge/jnlp/PluginBridge.java Wed Jan 06 17:34:03 2016 +0100
+++ b/netx/net/sourceforge/jnlp/PluginBridge.java Thu Jan 07 15:33:12 2016 +0100
@@ -40,6 +40,7 @@
import net.sourceforge.jnlp.cache.UpdatePolicy;
import net.sourceforge.jnlp.runtime.JNLPRuntime;
import net.sourceforge.jnlp.util.StreamUtils;
+import net.sourceforge.jnlp.util.UrlUtils;
import net.sourceforge.jnlp.util.logging.OutputController;
import net.sourceforge.jnlp.util.replacements.BASE64Decoder;
@@ -130,7 +131,10 @@
}.readStream();
} else {
- jnlpFile = jnlpCreator.create(jnlp, null, defaultSettings, JNLPRuntime.getDefaultUpdatePolicy(), codeBase);
+ // see http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=2746#c3
+ URL codebaseRewriter=UrlUtils.ensureSlashTail(UrlUtils.removeFileName(jnlp));
+ this.codeBase = codebaseRewriter;
+ jnlpFile = jnlpCreator.create(jnlp, null, defaultSettings, JNLPRuntime.getDefaultUpdatePolicy(), codebaseRewriter);
debugJnlp = new StreamProvider() {
@Override
@@ -594,7 +598,7 @@
private static String getAllPermissionsElement() {
return " <all-permissions/>\n";
}
-
+
private abstract class StreamProvider {
diff -r 486f0dc7b5ca -r 834746c2a271 netx/net/sourceforge/jnlp/SecurityDesc.java
--- a/netx/net/sourceforge/jnlp/SecurityDesc.java Wed Jan 06 17:34:03 2016 +0100
+++ b/netx/net/sourceforge/jnlp/SecurityDesc.java Thu Jan 07 15:33:12 2016 +0100
@@ -415,7 +415,11 @@
}
}
try {
- final URI codebase = file.getCodeBase().toURI().normalize();
+ URL codebaseOriginal = file.getCodeBase();
+ if (codebaseOriginal == null){
+ codebaseOriginal =file.fileLocation;
+ }
+ final URI codebase = codebaseOriginal.toURI().normalize();
final URI host = getHost(codebase);
final String codebaseHostUriString = host.toString();
final String urlPermissionUrlString = appendRecursiveSubdirToCodebaseHostString(codebaseHostUriString);
diff -r 486f0dc7b5ca -r 834746c2a271 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java Wed Jan 06 17:34:03 2016 +0100
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java Thu Jan 07 15:33:12 2016 +0100
@@ -36,7 +36,6 @@
package net.sourceforge.jnlp.security.appletextendedsecurity;
-import java.net.MalformedURLException;
import static net.sourceforge.jnlp.runtime.Translator.R;
import java.net.URL;
@@ -49,8 +48,8 @@
import net.sourceforge.jnlp.JNLPFile;
import net.sourceforge.jnlp.LaunchException;
import net.sourceforge.jnlp.PluginBridge;
+import net.sourceforge.jnlp.runtime.JNLPClassLoader.SecurityDelegate;
import net.sourceforge.jnlp.runtime.JNLPRuntime;
-import net.sourceforge.jnlp.runtime.JNLPClassLoader.SecurityDelegate;
import net.sourceforge.jnlp.security.dialogs.apptrustwarningpanel.AppTrustWarningPanel.AppSigningWarningAction;
import net.sourceforge.jnlp.security.CertVerifier;
import net.sourceforge.jnlp.security.SecurityDialogs;
@@ -140,7 +139,7 @@
/* Else, create a new entry */
UrlRegEx codebaseRegex = UrlRegEx.quote(codebase.toExternalForm());
- UrlRegEx documentbaseRegex = UrlRegEx.quoteAndStar(stripFile(documentbase)); // Match any from codebase and sourceFile "base"
+ UrlRegEx documentbaseRegex = UrlRegEx.quoteAndStar(UrlUtils.stripFile(documentbase)); // Match any from codebase and sourceFile "base"
List<String> archiveMatches = null; // Match any from codebase
if (!rememberForCodeBase) {
@@ -278,48 +277,4 @@
}
- static String stripFile(URL documentbase) {
- //whenused in generation of regec, the trailing slash is very important
- //see the result between http:/some.url/path.* and http:/some.url/path/.*
- return ensureSlashTail(stripFileImp(documentbase));
- }
-
- private static String stripFileImp(URL documentbase) {
- try {
- String normalized = UrlUtils.normalizeUrlAndStripParams(documentbase).toExternalForm().trim();
- if (normalized.endsWith("/") || normalized.endsWith("\\")) {
- return normalized;
- }
- URL middleway = new URL(normalized);
- String file = middleway.getFile();
- int i = Math.max(file.lastIndexOf('/'), file.lastIndexOf('\\'));
- if (i<0){
- return normalized;
- }
- String parent = file.substring(0, i+1);
- String stripped = normalized.replace(file, parent);
- return stripped;
- } catch (Exception ex) {
- OutputController.getLogger().log(ex);
- return documentbase.toExternalForm();
- }
-
- }
-
- private static String ensureSlashTail(String s) {
- if (s.endsWith("/")) {
- return s;
- }
- if (s.endsWith("\\")) {
- return s;
- }
- if (s.contains("/")) {
- return s + "/";
- }
- if (s.contains("\\")) {
- return s + "\\";
- }
- return s + "/";
- }
-
}
diff -r 486f0dc7b5ca -r 834746c2a271 netx/net/sourceforge/jnlp/util/UrlUtils.java
--- a/netx/net/sourceforge/jnlp/util/UrlUtils.java Wed Jan 06 17:34:03 2016 +0100
+++ b/netx/net/sourceforge/jnlp/util/UrlUtils.java Thu Jan 07 15:33:12 2016 +0100
@@ -346,5 +346,63 @@
public static String getHostAndPort(final URL url) {
return url.getHost() + ":" + getSanitizedPort(url);
}
+
+ public static URL ensureSlashTail(URL u) {
+ if (u == null) {
+ return null;
+ }
+ String s = ensureSlashTail(u.toExternalForm());
+ try {
+ return new URL(s);
+ } catch (MalformedURLException ex) {
+ OutputController.getLogger().log(ex);
+ return u;
+ }
+
+ }
+
+ public static String ensureSlashTail(String s) {
+ if (s.endsWith("/")) {
+ return s;
+ }
+ if (s.endsWith("\\")) {
+ return s;
+ }
+ if (s.contains("/")) {
+ return s + "/";
+ }
+ if (s.contains("\\")) {
+ return s + "\\";
+ }
+ return s + "/";
+ }
+
+ public static String stripFile(URL documentbase) {
+ //whenused in generation of regec, the trailing slash is very important
+ //see the result between http:/some.url/path.* and http:/some.url/path/.*
+ return UrlUtils.ensureSlashTail(stripFileImp(documentbase));
+ }
+
+ private static String stripFileImp(URL documentbase) {
+ try {
+ String normalized = UrlUtils.normalizeUrlAndStripParams(documentbase).toExternalForm().trim();
+ if (normalized.endsWith("/") || normalized.endsWith("\\")) {
+ return normalized;
+ }
+ URL middleway = new URL(normalized);
+ String file = middleway.getFile();
+ int i = Math.max(file.lastIndexOf('/'), file.lastIndexOf('\\'));
+ if (i < 0) {
+ return normalized;
+ }
+ String parent = file.substring(0, i + 1);
+ String stripped = normalized.replace(file, parent);
+ return stripped;
+ } catch (Exception ex) {
+ OutputController.getLogger().log(ex);
+ return documentbase.toExternalForm();
+ }
+
+ }
}
diff -r 486f0dc7b5ca -r 834746c2a271 netx/net/sourceforge/nanoxml/XMLElement.java
--- a/netx/net/sourceforge/nanoxml/XMLElement.java Wed Jan 06 17:34:03 2016 +0100
+++ b/netx/net/sourceforge/nanoxml/XMLElement.java Thu Jan 07 15:33:12 2016 +0100
@@ -195,6 +195,11 @@
* Character read too much for the comment remover.
*/
private char sanitizeCharReadTooMuch;
+
+ /**
+ * Whether the BOM header appeared
+ */
+ private boolean BOM = false;
/**
* The reader provided by the caller of the parse method.
@@ -494,7 +499,7 @@
this.parserLineNr = startingLineNr;
for (;;) {
- char ch = this.scanWhitespace();
+ char ch = this.scanLeadingWhitespace();
if (ch != '<') {
throw this.expectedInput("<", ch);
@@ -584,24 +589,50 @@
}
}
+ private boolean isRegularWhiteSpace(char ch) {
+ switch (ch) {
+ case ' ':
+ case '\t':
+ case '\n':
+ case '\r':
+ return true;
+ default:
+ return false;
+ }
+ }
+
/**
* This method scans an identifier from the current reader.
*
* @return the next character following the whitespace.
* @throws java.io.IOException if something goes wrong
*/
- protected char scanWhitespace()
+ private char scanWhitespace()
throws IOException {
- for (;;) {
+ while(true) {
char ch = this.readChar();
- switch (ch) {
- case ' ':
- case '\t':
- case '\n':
- case '\r':
- break;
- default:
- return ch;
+ if (!isRegularWhiteSpace(ch)) {
+ return ch;
+ }
+ }
+ }
+ /**
+ * This method scans an leading identifier from the current reader.
+ *
+ * UNlike scanWhitespace, it skipps also BOM
+ *
+ * @return the next character following the whitespace.
+ * @throws java.io.IOException if something goes wrong
+ */
+ private char scanLeadingWhitespace()
+ throws IOException {
+ while(true) {
+ char ch = this.readChar();
+ //this is BOM , not space
+ if (ch == '') {
+ BOM = true;
+ } else if (!isRegularWhiteSpace(ch)) {
+ return ch;
}
}
}
@@ -621,18 +652,17 @@
*/
protected char scanWhitespace(StringBuffer result)
throws IOException {
- for (;;) {
+ while (true) {
char ch = this.readChar();
- switch (ch) {
- case ' ':
- case '\t':
- case '\n':
- result.append(ch);
- break;
- case '\r':
- break;
- default:
- return ch;
+ if (!isRegularWhiteSpace(ch)) {
+ return ch;
+ } else {
+ switch (ch) {
+ case ' ':
+ case '\t':
+ case '\n':
+ result.append(ch);
+ }
}
}
}
@@ -1297,4 +1327,11 @@
}
}
+
+ public boolean isBOM() {
+ return BOM;
+ }
+
+
+
}
diff -r 486f0dc7b5ca -r 834746c2a271 plugin/icedteanp/IcedTeaNPPlugin.cc
--- a/plugin/icedteanp/IcedTeaNPPlugin.cc Wed Jan 06 17:34:03 2016 +0100
+++ b/plugin/icedteanp/IcedTeaNPPlugin.cc Thu Jan 07 15:33:12 2016 +0100
@@ -1154,13 +1154,13 @@
if (g_str_has_prefix(parts[1], "PluginProxyInfo"))
{
gchar* proxy = NULL;
- uint32_t len;
+ uint32_t len = 0;
gchar* decoded_url = (gchar*) calloc(strlen(parts[4]) + 1, sizeof(gchar));
IcedTeaPluginUtilities::decodeURL(parts[4], &decoded_url);
PLUGIN_DEBUG("parts[0]=%s, parts[1]=%s, reference, parts[3]=%s, parts[4]=%s -- decoded_url=%s\n", parts[0], parts[1], parts[3], parts[4], decoded_url);
- gchar* proxy_info;
+ gchar* proxy_info = NULL;
proxy_info = g_strconcat ("plugin PluginProxyInfo reference ", parts[3], " ", NULL);
if (get_proxy_info(decoded_url, &proxy, &len) == NPERR_NO_ERROR)
@@ -1331,10 +1331,16 @@
}
if (browser_functions.getvalueforurl)
{
-
+ NPError err;
// As in get_cookie_info, we use the first active instance
gpointer instance=getFirstInTableInstance(instance_to_id_map);
- browser_functions.getvalueforurl((NPP) instance, NPNURLVProxy, siteAddr, proxy, len);
+ err = browser_functions.getvalueforurl((NPP) instance, NPNURLVProxy, siteAddr, proxy, len);
+
+ if (err != NPERR_NO_ERROR)
+ {
+ *proxy = (char *) malloc(sizeof **proxy * 7);
+ *len = g_strlcpy(*proxy, "DIRECT", 7);
+ }
} else
{
return NPERR_GENERIC_ERROR;
diff -r 486f0dc7b5ca -r 834746c2a271 tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java
--- a/tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java Wed Jan 06 17:34:03 2016 +0100
+++ b/tests/netx/unit/net/sourceforge/jnlp/ParserMalformedXml.java Thu Jan 07 15:33:12 2016 +0100
@@ -42,7 +42,10 @@
import java.io.InputStream;
import java.io.InputStreamReader;
import java.io.IOException;
+import net.sourceforge.jnlp.annotations.Bug;
import net.sourceforge.jnlp.annotations.KnownToFail;
+import net.sourceforge.jnlp.util.FileUtils;
+import org.junit.Assert;
import org.junit.BeforeClass;
import org.junit.Test;
@@ -105,5 +108,21 @@
String malformedJnlp = originalJnlp.replace("'jnlp.jnlp'", "jnlp.jnlp");
Parser.getRootNode(new ByteArrayInputStream(malformedJnlp.getBytes()), new ParserSettings(false, true, false));
}
+
+
+ @Bug(id = "PR2690")
+ @Test
+ public void testXmlBomTagSoupOff() throws ParseException {
+ InputStream is = ClassLoader.getSystemClassLoader().getResourceAsStream("net/sourceforge/jnlp/templates/EFBBBF.jnlp");
+ Assert.assertNotNull(is);
+ Parser.getRootNode(is, new ParserSettings(false, true, false));
+ }
+
+ @Test
+ public void testXmlBomTagSoupOn() throws ParseException {
+ InputStream is = ClassLoader.getSystemClassLoader().getResourceAsStream("net/sourceforge/jnlp/templates/EFBBBF.jnlp");
+ Assert.assertNotNull(is);
+ Parser.getRootNode(is, new ParserSettings(false, true, true));
+ }
}
diff -r 486f0dc7b5ca -r 834746c2a271 tests/netx/unit/net/sourceforge/jnlp/PluginBridgeTest.java
More information about the distro-pkg-dev
mailing list