/*
* Copyright 2015 MovingBlocks
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.terasology.module;
import org.junit.Before;
import org.junit.Test;
import org.reflections.ReflectionsException;
import org.terasology.module.sandbox.ModuleSecurityManager;
import org.terasology.module.sandbox.ModuleSecurityPolicy;
import org.terasology.module.sandbox.PermissionSet;
import org.terasology.module.sandbox.StandardPermissionProviderFactory;
import org.terasology.naming.Name;
import org.terasology.test.api.IOInterface;
import org.terasology.test.api.IndexForTest;
import java.io.FilePermission;
import java.lang.reflect.InvocationTargetException;
import java.nio.file.Paths;
import java.security.Policy;
import java.util.Collections;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertTrue;
/**
* @author Immortius
*/
public class SandboxTest {
private ModuleRegistry registry;
private StandardPermissionProviderFactory permissionProviderFactory = new StandardPermissionProviderFactory();
@Before
public void setup() {
registry = new TableModuleRegistry();
new ModulePathScanner().scan(registry, Paths.get("test-modules").toAbsolutePath());
permissionProviderFactory.getBasePermissionSet().addAPIPackage("sun.reflect");
permissionProviderFactory.getBasePermissionSet().addAPIPackage("java.lang");
permissionProviderFactory.getBasePermissionSet().addAPIPackage("java.util");
PermissionSet ioPermissionSet = new PermissionSet();
ioPermissionSet.addAPIPackage("java.io");
ioPermissionSet.addAPIPackage("java.nio.file");
ioPermissionSet.addAPIPackage("java.nio.file.attribute");
ioPermissionSet.addAPIClass(IOInterface.class);
ioPermissionSet.grantPermission(FilePermission.class);
permissionProviderFactory.addPermissionSet("io", ioPermissionSet);
Policy.setPolicy(new ModuleSecurityPolicy());
System.setSecurityManager(new ModuleSecurityManager());
}
// Ensure a normal method using globally allowed classes works
@Test
public void accessToNormalMethod() throws Exception {
DependencyResolver resolver = new DependencyResolver(registry);
ModuleEnvironment environment = new ModuleEnvironment(resolver.resolve(new Name("moduleA")).getModules(), permissionProviderFactory, Collections.emptyList());
Class<?> type = findClass("ModuleAClass", environment);
Object instance = type.newInstance();
type.getMethod("standardMethod").invoke(instance);
}
// Ensure access to disallowed classes fails
@Test(expected = InvocationTargetException.class)
public void deniedAccessToRestrictedClassInMethod() throws Exception {
DependencyResolver resolver = new DependencyResolver(registry);
ModuleEnvironment environment = new ModuleEnvironment(resolver.resolve(new Name("moduleB")).getModules(), permissionProviderFactory, Collections.emptyList());
Class<?> type = findClass("ModuleBClass", environment);
Object instance = type.newInstance();
type.getMethod("illegalMethod").invoke(instance);
}
@Test(expected = ClassNotFoundException.class)
public void deniedAccessToClassImplementingRestrictedInterface() throws Exception {
DependencyResolver resolver = new DependencyResolver(registry);
ModuleEnvironment environment = new ModuleEnvironment(resolver.resolve(new Name("moduleD")).getModules(), permissionProviderFactory, Collections.emptyList());
findClass("ModuleDRestrictedClass", environment);
}
@Test
public void allowedAccessToClassImplementingPermissionSetInterface() throws Exception {
DependencyResolver resolver = new DependencyResolver(registry);
ModuleEnvironment environment = new ModuleEnvironment(resolver.resolve(new Name("moduleB")).getModules(), permissionProviderFactory, Collections.emptyList());
Class<?> type = findClass("ModuleBPermittedClass", environment);
assertNotNull(type);
assertTrue(IOInterface.class.isAssignableFrom(type));
}
// Ensures access to additionally required permission sets works (both classes and permissions)
@Test
public void allowedAccessToClassFromRequiredPermissionSet() throws Exception {
DependencyResolver resolver = new DependencyResolver(registry);
ModuleEnvironment environment = new ModuleEnvironment(resolver.resolve(new Name("moduleB")).getModules(), permissionProviderFactory, Collections.emptyList());
Class<?> type = findClass("ModuleBClass", environment);
Object instance = type.newInstance();
type.getMethod("requiresIoMethod").invoke(instance);
}
// Ensure that a module doesn't gain accesses required by the parent but not by itself
@Test(expected = InvocationTargetException.class)
public void deniedAccessToClassPermittedToParent() throws Exception {
DependencyResolver resolver = new DependencyResolver(registry);
ModuleEnvironment environment = new ModuleEnvironment(resolver.resolve(new Name("moduleC")).getModules(), permissionProviderFactory, Collections.emptyList());
Class<?> type = findClass("ModuleCClass", environment);
Object instance = type.newInstance();
type.getMethod("requiresIoMethod").invoke(instance);
}
private Class<?> findClass(String name, ModuleEnvironment environment) throws ClassNotFoundException {
for (Class<?> type : environment.getTypesAnnotatedWith(IndexForTest.class)) {
if (type.getSimpleName().equals(name)) {
return type;
}
}
throw new ClassNotFoundException(name);
}
}