changeset 917:483ab446ea4c

Fix PolicyEditor unit tests after refactor * tests/netx/unit/net/sourceforge/jnlp/security/policyeditor/PolicyEditorPermissionsTest.java: (testActionsRegex, testTargetRegex, testRegexesAgainstBadPermissionNames): update after moving regexes from PolicyEditorPermissions into CustomPermission
author Andrew Azores <aazores@redhat.com>
date Mon, 10 Mar 2014 12:29:47 -0400
parents 17c6e5a59602
children f6336bc81da8
files ChangeLog tests/netx/unit/net/sourceforge/jnlp/security/policyeditor/PolicyEditorPermissionsTest.java
diffstat 2 files changed, 26 insertions(+), 19 deletions(-) [+]
line wrap: on
line diff
--- a/ChangeLog	Mon Mar 10 12:17:56 2014 -0400
+++ b/ChangeLog	Mon Mar 10 12:29:47 2014 -0400
@@ -1,3 +1,10 @@
+2014-03-10  Andrew Azores  <aazores@redhat.com>
+
+	* tests/netx/unit/net/sourceforge/jnlp/security/policyeditor/PolicyEditorPermissionsTest.java:
+	(testActionsRegex, testTargetRegex, testRegexesAgainstBadPermissionNames):
+	update after moving regexes from PolicyEditorPermissions into
+	CustomPermission
+
 2014-03-10  Andrew Azores  <aazores@redhat.com>
 
 	PolicyEditor parsing enhancements, new tests, and bugfixes
--- a/tests/netx/unit/net/sourceforge/jnlp/security/policyeditor/PolicyEditorPermissionsTest.java	Mon Mar 10 12:17:56 2014 -0400
+++ b/tests/netx/unit/net/sourceforge/jnlp/security/policyeditor/PolicyEditorPermissionsTest.java	Mon Mar 10 12:29:47 2014 -0400
@@ -71,37 +71,37 @@
 
     @Test
     public void testActionsRegex() throws Exception {
-    	final Pattern pattern = PolicyEditorPermissions.ACTIONS_PERMISSION;
+        final Pattern pattern = CustomPermission.ACTIONS_PERMISSION;
 
-    	final String actionsPermission = "permission java.io.FilePermission \"${user.home}\", \"read\";";
-    	final String targetPermission = "permission java.io.RuntimePermission \"queuePrintJob\";";
-    	final String badPermission = "permission java.io.FilePermission user.home read;";
+        final String actionsPermission = "permission java.io.FilePermission \"${user.home}\", \"read\";";
+        final String targetPermission = "permission java.io.RuntimePermission \"queuePrintJob\";";
+        final String badPermission = "permission java.io.FilePermission user.home read;";
 
-    	assertTrue(actionsPermission + " should match", pattern.matcher(actionsPermission).matches());
-    	assertFalse(targetPermission + " should not match", pattern.matcher(targetPermission).matches());
-    	assertFalse(badPermission + " should not match", pattern.matcher(badPermission).matches());
+        assertTrue(actionsPermission + " should match", pattern.matcher(actionsPermission).matches());
+        assertFalse(targetPermission + " should not match", pattern.matcher(targetPermission).matches());
+        assertFalse(badPermission + " should not match", pattern.matcher(badPermission).matches());
     }
 
     @Test
     public void testTargetRegex() throws Exception {
-    	final Pattern pattern = PolicyEditorPermissions.TARGET_PERMISSION;
+        final Pattern pattern = CustomPermission.TARGET_PERMISSION;
 
-    	final String actionsPermission = "permission java.io.FilePermission \"${user.home}\", \"read\";";
-    	final String targetPermission = "permission java.io.RuntimePermission \"queuePrintJob\";";
-    	final String badPermission = "permission java.io.FilePermission user.home read;";
+        final String actionsPermission = "permission java.io.FilePermission \"${user.home}\", \"read\";";
+        final String targetPermission = "permission java.io.RuntimePermission \"queuePrintJob\";";
+        final String badPermission = "permission java.io.FilePermission user.home read;";
 
-    	assertFalse(actionsPermission + " should not match", pattern.matcher(actionsPermission).matches());
-    	assertTrue(targetPermission + " should match", pattern.matcher(targetPermission).matches());
-    	assertFalse(badPermission + " should not match", pattern.matcher(badPermission).matches());
+        assertFalse(actionsPermission + " should not match", pattern.matcher(actionsPermission).matches());
+        assertTrue(targetPermission + " should match", pattern.matcher(targetPermission).matches());
+        assertFalse(badPermission + " should not match", pattern.matcher(badPermission).matches());
     }
 
     @Test
     public void testRegexesAgainstBadPermissionNames() throws Exception {
-    	final Pattern targetPattern = PolicyEditorPermissions.TARGET_PERMISSION;
-    	final Pattern actionsPattern = PolicyEditorPermissions.ACTIONS_PERMISSION;
-    	final String badPermission = "permission abc123^$% \"target\", \"actions\"";
+        final Pattern targetPattern = CustomPermission.TARGET_PERMISSION;
+        final Pattern actionsPattern = CustomPermission.ACTIONS_PERMISSION;
+        final String badPermission = "permission abc123^$% \"target\", \"actions\"";
 
-    	assertFalse(badPermission + " should not match", targetPattern.matcher(badPermission).matches());
-    	assertFalse(badPermission + " should not match", actionsPattern.matcher(badPermission).matches());
+        assertFalse(badPermission + " should not match", targetPattern.matcher(badPermission).matches());
+        assertFalse(badPermission + " should not match", actionsPattern.matcher(badPermission).matches());
     }
 }