javacommons/security/tsrc/javasrc/com/nokia/mj/impl/security/midp/authorization/AccessControllerTests.java
branchRCL_3
changeset 83 26b2b12093af
parent 71 d5e927d5853b
--- a/javacommons/security/tsrc/javasrc/com/nokia/mj/impl/security/midp/authorization/AccessControllerTests.java	Wed Sep 15 12:05:25 2010 +0300
+++ b/javacommons/security/tsrc/javasrc/com/nokia/mj/impl/security/midp/authorization/AccessControllerTests.java	Wed Oct 13 14:23:59 2010 +0300
@@ -47,7 +47,6 @@
 public class AccessControllerTests extends TestCase implements InstallerMain
 {
 
-    int assertTrace = 0;
     // Begin j2meunit test framework setup
     public void installerMain(String[] args)
     {
@@ -92,12 +91,6 @@
     {
     }
 
-    private void assertWithTrace(boolean aCondition)
-    {
-        assertTrue("" + assertTrace, aCondition);
-        assertTrace++;
-    }
-
     protected void testAccessControllerFactory()
     {
         Uid appUID1 = Uid.createUid("appUID1");
@@ -107,17 +100,17 @@
         String appName = "AccessControllerTests";
         // check null values
         ac1 = AccessControllerFactoryImpl.getAccessController(null, null);
-        assertWithTrace(ac1 == null);
+        assertTrue(ac1 == null);
         AccessControllerFactoryImpl.destroyAccessController(null);
         ac1 = AccessControllerFactoryImpl.getAccessController(null, "appName");
-        assertWithTrace(ac1 == null);
+        assertTrue(ac1 == null);
         AccessControllerFactoryImpl.destroyAccessController(null);
         // check duplicates
         AccessControllerFactoryImpl.destroyAccessController(appUID1);
         ac1 = AccessControllerFactoryImpl.getAccessController(appUID1, appName);
         ac2 = AccessControllerFactoryImpl.getAccessController(appUID1, appName);
         AccessControllerFactoryImpl.destroyAccessController(appUID1);
-        assertWithTrace(ac1 == ac2);
+        assertTrue(ac1 == ac2);
         // check destroy
         ac1 = AccessControllerFactoryImpl.getAccessController(appUID1, appName);
         AccessControllerFactoryImpl.destroyAccessController(appUID1);
@@ -125,7 +118,7 @@
         // call destroy two times (or calling it on a UID which does not have an instance)
         AccessControllerFactoryImpl.destroyAccessController(appUID1);
         AccessControllerFactoryImpl.destroyAccessController(appUID1);
-        assertWithTrace(ac1 != ac2);
+        assertTrue(ac1 != ac2);
     }
 
     protected void testAccessController()
@@ -142,32 +135,32 @@
         try
         {
             ac.checkPermission((Permission)null);
-            assertWithTrace(false);
+            assertTrue(false);
         }
         catch (AccessControlException e)
         {
-            assertWithTrace(true);
+            assertTrue(true);
         }
-        assertWithTrace(ac.checkPermission((String)null) == 0);
+        assertTrue(ac.checkPermission((String)null) == 0);
         // check permission which is not granted
         PermissionResolver.testClearCache();
         try
         {
             ac.checkPermission(new CommProtocolPermission("comm://"));
-            assertWithTrace(false);
+            assertTrue(false);
         }
         catch (AccessControlException e)
         {
-            assertWithTrace(true);
+            assertTrue(true);
         }
         try
         {
             ac.checkPermission(new CommProtocolPermission("comm://"));
-            assertWithTrace(false);
+            assertTrue(false);
         }
         catch (AccessControlException e)
         {
-            assertWithTrace(true);
+            assertTrue(true);
         }
         // check allowed permission which is granted
         PermissionResolver.testClearCache();
@@ -183,11 +176,11 @@
         try
         {
             ac.checkPermission(new FileProtocolPermission("file://myFile.txt", "read"));
-            assertWithTrace(false);
+            assertTrue(false);
         }
         catch (AccessControlException e)
         {
-            assertWithTrace(true);
+            assertTrue(true);
         }
         storage.removeGrantedPermissions(appUID);
         // check permission not allowed
@@ -209,11 +202,11 @@
         try
         {
             ac.checkPermission(new SocketProtocolPermission("socket://:100"));
-            assertWithTrace(false);
+            assertTrue(false);
         }
         catch (AccessControlException e)
         {
-            assertWithTrace(true);
+            assertTrue(true);
         }
         storage.removeGrantedPermissions(appUID);
         // check user permission with NO as interaction mode -> security exception thrown
@@ -235,35 +228,35 @@
         try
         {
             ac.checkPermission(new HttpProtocolPermissionImpl("http://"));
-            assertWithTrace(false);
+            assertTrue(false);
         }
         catch (AccessControlException e)
         {
-            assertWithTrace(true);
+            assertTrue(true);
         }
         try
         {
             ac.checkPermission(new HttpProtocolPermission("http://"));
-            assertWithTrace(false);
+            assertTrue(false);
         }
         catch (AccessControlException e)
         {
-            assertWithTrace(true);
+            assertTrue(true);
         }
         storage.removeGrantedPermissions(appUID);
         // check the named permissions: unknown permission
-        assertWithTrace(ac.checkPermission("unknownPermission") == 0);
+        assertTrue(ac.checkPermission("unknownPermission") == 0);
         // check the named permissions: allowed permission
         PermissionResolver.testClearCache();
         grantedPermissions = new Vector();
         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
                                           "com.nokia.mj.impl.gcf.protocol.socket.SocketPermissionImpl",
-                                          "socket://*",
+                                          "socket://",
                                           null,
                                           null));
         storage.removeGrantedPermissions(appUID);
         storage.writeGrantedPermissions(appUID, null, grantedPermissions);
-        assertWithTrace(ac.checkPermission("javax.microedition.io.Connector.socket") == 1);
+        assertTrue(ac.checkPermission("javax.microedition.io.Connector.socket") == 1);
         // check the named permissions: user permission with NO interaction mode
         PermissionResolver.testClearCache();
         grantedPermissions = new Vector();
@@ -280,7 +273,7 @@
                                                                                  })));
         storage.removeGrantedPermissions(appUID);
         storage.writeGrantedPermissions(appUID, null, grantedPermissions);
-        assertWithTrace(ac.checkPermission("javax.microedition.io.Connector.http") == 0);
+        assertTrue(ac.checkPermission("javax.microedition.io.Connector.http") == 0);
         // check the named permissions: user permission with ONESHOT interaction mode
         PermissionResolver.testClearCache();
         grantedPermissions = new Vector();
@@ -297,7 +290,7 @@
                                                                                  })));
         storage.removeGrantedPermissions(appUID);
         storage.writeGrantedPermissions(appUID, null, grantedPermissions);
-        assertWithTrace(ac.checkPermission("javax.microedition.io.Connector.http") == -1);
+        assertTrue(ac.checkPermission("javax.microedition.io.Connector.http") == -1);
         // check the named permissions: user permission with BLANKET interaction mode (blanket prompt not shown yet)
         PermissionResolver.testClearCache();
         grantedPermissions = new Vector();
@@ -314,7 +307,7 @@
                                                                                  })));
         storage.removeGrantedPermissions(appUID);
         storage.writeGrantedPermissions(appUID, null, grantedPermissions);
-        assertWithTrace(ac.checkPermission("javax.microedition.io.Connector.http") == -1);
+        assertTrue(ac.checkPermission("javax.microedition.io.Connector.http") == -1);
         // check the named permissions: user permission with BLANKET interaction mode (blanket prompt shown already)
         PermissionResolver.testClearCache();
         grantedPermissions = new Vector();
@@ -332,7 +325,7 @@
         storage.removeGrantedPermissions(appUID);
         storage.writeGrantedPermissions(appUID, null, grantedPermissions);
         storage.writeUserSecuritySettingsPromptFlag(appUID, "Net Access", true);
-        assertWithTrace(ac.checkPermission("javax.microedition.io.Connector.http") == 1);
+        assertTrue(ac.checkPermission("javax.microedition.io.Connector.http") == 1);
         // check the named permissions: user permission with SESSION interaction mode (session prompt not shown already)
         PermissionResolver.testClearCache();
         grantedPermissions = new Vector();
@@ -350,7 +343,7 @@
         storage.removeGrantedPermissions(appUID);
         storage.writeGrantedPermissions(appUID, null, grantedPermissions);
         storage.writeUserSecuritySettingsPromptFlag(appUID, "Net Access", true);
-        assertWithTrace(ac.checkPermission("javax.microedition.io.Connector.http") == -1);
+        assertTrue(ac.checkPermission("javax.microedition.io.Connector.http") == -1);
         // check the named permissions: denied permission
         PermissionResolver.testClearCache();
         grantedPermissions = new Vector();
@@ -361,7 +354,7 @@
                                           null));
         storage.removeGrantedPermissions(appUID);
         storage.writeGrantedPermissions(appUID, null, grantedPermissions);
-        assertWithTrace(ac.checkPermission("javax.wireless.messaging.mms.send") == 0);
+        assertTrue(ac.checkPermission("javax.wireless.messaging.mms.send") == 0);
         // cleanup
         storage.removeGrantedPermissions(appUID);
         AccessControllerFactoryImpl.destroyAccessController(appUID);