ViewVC Help
View File | Revision Log | Show Annotations | Download File | Root Listing
root/jsr166/jsr166/src/test/tck/ExecutorsTest.java
(Generate patch)

Comparing jsr166/src/test/tck/ExecutorsTest.java (file contents):
Revision 1.10 by tim, Wed Dec 10 01:51:12 2003 UTC vs.
Revision 1.14 by dl, Tue Jan 20 20:20:56 2004 UTC

# Line 1 | Line 1
1   /*
2 < * Written by members of JCP JSR-166 Expert Group and released to the
3 < * public domain. Use, modify, and redistribute this code in any way
4 < * without acknowledgement. Other contributors include Andrew Wright,
5 < * Jeffrey Hayes, Pat Fischer, Mike Judd.
2 > * Written by Doug Lea with assistance from members of JCP JSR-166
3 > * Expert Group and released to the public domain, as explained at
4 > * http://creativecommons.org/licenses/publicdomain
5 > * Other contributors include Andrew Wright, Jeffrey Hayes,
6 > * Pat Fisher, Mike Judd.
7   */
8  
9  
# Line 68 | Line 69 | public class ExecutorsTest extends JSR16
69          e.execute(new NoOpRunnable());
70          e.execute(new NoOpRunnable());
71          e.execute(new NoOpRunnable());
72 <        e.shutdown();
72 >        joinPool(e);
73      }
74  
75      /**
# Line 79 | Line 80 | public class ExecutorsTest extends JSR16
80          e.execute(new NoOpRunnable());
81          e.execute(new NoOpRunnable());
82          e.execute(new NoOpRunnable());
83 <        e.shutdown();
83 >        joinPool(e);
84      }
85  
86      /**
# Line 103 | Line 104 | public class ExecutorsTest extends JSR16
104          e.execute(new NoOpRunnable());
105          e.execute(new NoOpRunnable());
106          e.execute(new NoOpRunnable());
107 <        e.shutdown();
107 >        joinPool(e);
108      }
109  
110      /**
# Line 114 | Line 115 | public class ExecutorsTest extends JSR16
115          e.execute(new NoOpRunnable());
116          e.execute(new NoOpRunnable());
117          e.execute(new NoOpRunnable());
118 <        e.shutdown();
118 >        joinPool(e);
119      }
120  
121      /**
# Line 130 | Line 131 | public class ExecutorsTest extends JSR16
131      }
132  
133      /**
134 +     * A new SingleThreadExecutor cannot be casted to concrete implementation
135 +     */
136 +    public void testCastNewSingleThreadExecutor() {
137 +        ExecutorService e = Executors.newSingleThreadExecutor();
138 +        try {
139 +            ThreadPoolExecutor tpe = (ThreadPoolExecutor)e;
140 +        } catch (ClassCastException success) {
141 +        } finally {
142 +            joinPool(e);
143 +        }
144 +    }
145 +
146 +
147 +    /**
148       * A new newFixedThreadPool can execute runnables
149       */
150      public void testNewFixedThreadPool1() {
# Line 137 | Line 152 | public class ExecutorsTest extends JSR16
152          e.execute(new NoOpRunnable());
153          e.execute(new NoOpRunnable());
154          e.execute(new NoOpRunnable());
155 <        e.shutdown();
155 >        joinPool(e);
156      }
157  
158      /**
# Line 148 | Line 163 | public class ExecutorsTest extends JSR16
163          e.execute(new NoOpRunnable());
164          e.execute(new NoOpRunnable());
165          e.execute(new NoOpRunnable());
166 <        e.shutdown();
166 >        joinPool(e);
167      }
168  
169      /**
# Line 177 | Line 192 | public class ExecutorsTest extends JSR16
192  
193  
194      /**
195 +     * An unconfigurable newFixedThreadPool can execute runnables
196 +     */
197 +    public void testunconfigurableExecutorService() {
198 +        ExecutorService e = Executors.unconfigurableExecutorService(Executors.newFixedThreadPool(2));
199 +        e.execute(new NoOpRunnable());
200 +        e.execute(new NoOpRunnable());
201 +        e.execute(new NoOpRunnable());
202 +        joinPool(e);
203 +    }
204 +
205 +    /**
206 +     * unconfigurableExecutorService(null) throws NPE
207 +     */
208 +    public void testunconfigurableExecutorServiceNPE() {
209 +        try {
210 +            ExecutorService e = Executors.unconfigurableExecutorService(null);
211 +        }
212 +        catch (NullPointerException success) {
213 +        }
214 +    }
215 +
216 +    /**
217 +     * unconfigurableScheduledExecutorService(null) throws NPE
218 +     */
219 +    public void testunconfigurableScheduledExecutorServiceNPE() {
220 +        try {
221 +            ExecutorService e = Executors.unconfigurableScheduledExecutorService(null);
222 +        }
223 +        catch (NullPointerException success) {
224 +        }
225 +    }
226 +
227 +
228 +    /**
229 +     * a newSingleThreadScheduledExecutor successfully runs delayed task
230 +     */
231 +    public void testNewSingleThreadScheduledExecutor() {
232 +        try {
233 +            TrackedCallable callable = new TrackedCallable();
234 +            ScheduledExecutorService p1 = Executors.newSingleThreadScheduledExecutor();
235 +            Future f = p1.schedule(callable, SHORT_DELAY_MS, TimeUnit.MILLISECONDS);
236 +            assertFalse(callable.done);
237 +            Thread.sleep(MEDIUM_DELAY_MS);
238 +            assertTrue(callable.done);
239 +            assertEquals(Boolean.TRUE, f.get());
240 +            joinPool(p1);
241 +        } catch(RejectedExecutionException e){}
242 +        catch(Exception e){
243 +            e.printStackTrace();
244 +            unexpectedException();
245 +        }
246 +    }
247 +
248 +    /**
249 +     * a newScheduledThreadPool successfully runs delayed task
250 +     */
251 +    public void testnewScheduledThreadPool() {
252 +        try {
253 +            TrackedCallable callable = new TrackedCallable();
254 +            ScheduledExecutorService p1 = Executors.newScheduledThreadPool(2);
255 +            Future f = p1.schedule(callable, SHORT_DELAY_MS, TimeUnit.MILLISECONDS);
256 +            assertFalse(callable.done);
257 +            Thread.sleep(MEDIUM_DELAY_MS);
258 +            assertTrue(callable.done);
259 +            assertEquals(Boolean.TRUE, f.get());
260 +            joinPool(p1);
261 +        } catch(RejectedExecutionException e){}
262 +        catch(Exception e){
263 +            e.printStackTrace();
264 +            unexpectedException();
265 +        }
266 +    }
267 +
268 +    /**
269 +     * an unconfigurable  newScheduledThreadPool successfully runs delayed task
270 +     */
271 +    public void testunconfigurableScheduledExecutorService() {
272 +        try {
273 +            TrackedCallable callable = new TrackedCallable();
274 +            ScheduledExecutorService p1 = Executors.unconfigurableScheduledExecutorService(Executors.newScheduledThreadPool(2));
275 +            Future f = p1.schedule(callable, SHORT_DELAY_MS, TimeUnit.MILLISECONDS);
276 +            assertFalse(callable.done);
277 +            Thread.sleep(MEDIUM_DELAY_MS);
278 +            assertTrue(callable.done);
279 +            assertEquals(Boolean.TRUE, f.get());
280 +            joinPool(p1);
281 +        } catch(RejectedExecutionException e){}
282 +        catch(Exception e){
283 +            e.printStackTrace();
284 +            unexpectedException();
285 +        }
286 +    }
287 +
288 +    /**
289       *  timeouts from execute will time out if they compute too long.
290       */
291      public void testTimedCallable() {
# Line 225 | Line 334 | public class ExecutorsTest extends JSR16
334          final ThreadGroup egroup = Thread.currentThread().getThreadGroup();
335          Runnable r = new Runnable() {
336                  public void run() {
337 <                    Thread current = Thread.currentThread();
338 <                    threadAssertTrue(!current.isDaemon());
339 <                    threadAssertTrue(current.getPriority() == Thread.NORM_PRIORITY);
340 <                    ThreadGroup g = current.getThreadGroup();
341 <                    SecurityManager s = System.getSecurityManager();
342 <                    if (s != null)
343 <                        threadAssertTrue(g == s.getThreadGroup());
344 <                    else
345 <                        threadAssertTrue(g == egroup);
346 <                    String name = current.getName();
347 <                    threadAssertTrue(name.endsWith("thread-1"));
337 >                    try {
338 >                        Thread current = Thread.currentThread();
339 >                        threadAssertTrue(!current.isDaemon());
340 >                        threadAssertTrue(current.getPriority() == Thread.NORM_PRIORITY);
341 >                        ThreadGroup g = current.getThreadGroup();
342 >                        SecurityManager s = System.getSecurityManager();
343 >                        if (s != null)
344 >                            threadAssertTrue(g == s.getThreadGroup());
345 >                        else
346 >                            threadAssertTrue(g == egroup);
347 >                        String name = current.getName();
348 >                        threadAssertTrue(name.endsWith("thread-1"));
349 >                    } catch (SecurityException ok) {
350 >                        // Also pass if not allowed to change setting
351 >                    }
352                  }
353              };
354          ExecutorService e = Executors.newSingleThreadExecutor(Executors.defaultThreadFactory());
355          
356          e.execute(r);
357 <        e.shutdown();
357 >        try {
358 >            e.shutdown();
359 >        } catch(SecurityException ok) {
360 >        }
361 >        
362          try {
363              Thread.sleep(SHORT_DELAY_MS);
364          } catch (Exception eX) {
# Line 257 | Line 374 | public class ExecutorsTest extends JSR16
374       * access control context and context class loader
375       */
376      public void testPrivilegedThreadFactory() {
377 <        Policy savedPolicy = Policy.getPolicy();
378 <        AdjustablePolicy policy = new AdjustablePolicy();
379 <        policy.addPermission(new RuntimePermission("getContextClassLoader"));
380 <        policy.addPermission(new RuntimePermission("setContextClassLoader"));
381 <        Policy.setPolicy(policy);
377 >        Policy savedPolicy = null;
378 >        try {
379 >            savedPolicy = Policy.getPolicy();
380 >            AdjustablePolicy policy = new AdjustablePolicy();
381 >            policy.addPermission(new RuntimePermission("getContextClassLoader"));
382 >            policy.addPermission(new RuntimePermission("setContextClassLoader"));
383 >            Policy.setPolicy(policy);
384 >        } catch (AccessControlException ok) {
385 >            return;
386 >        }
387          final ThreadGroup egroup = Thread.currentThread().getThreadGroup();
388          final ClassLoader thisccl = Thread.currentThread().getContextClassLoader();
389          final AccessControlContext thisacc = AccessController.getContext();
390          Runnable r = new Runnable() {
391                  public void run() {
392 <                    Thread current = Thread.currentThread();
393 <                    threadAssertTrue(!current.isDaemon());
394 <                    threadAssertTrue(current.getPriority() == Thread.NORM_PRIORITY);
395 <                    ThreadGroup g = current.getThreadGroup();
396 <                    SecurityManager s = System.getSecurityManager();
397 <                    if (s != null)
398 <                        threadAssertTrue(g == s.getThreadGroup());
399 <                    else
400 <                        threadAssertTrue(g == egroup);
401 <                    String name = current.getName();
402 <                    threadAssertTrue(name.endsWith("thread-1"));
403 <                    threadAssertTrue(thisccl == current.getContextClassLoader());
404 <                    threadAssertTrue(thisacc.equals(AccessController.getContext()));
392 >                    try {
393 >                        Thread current = Thread.currentThread();
394 >                        threadAssertTrue(!current.isDaemon());
395 >                        threadAssertTrue(current.getPriority() == Thread.NORM_PRIORITY);
396 >                        ThreadGroup g = current.getThreadGroup();
397 >                        SecurityManager s = System.getSecurityManager();
398 >                        if (s != null)
399 >                            threadAssertTrue(g == s.getThreadGroup());
400 >                        else
401 >                            threadAssertTrue(g == egroup);
402 >                        String name = current.getName();
403 >                        threadAssertTrue(name.endsWith("thread-1"));
404 >                        threadAssertTrue(thisccl == current.getContextClassLoader());
405 >                        threadAssertTrue(thisacc.equals(AccessController.getContext()));
406 >                    } catch(SecurityException ok) {
407 >                        // Also pass if not allowed to change settings
408 >                    }
409                  }
410              };
411          ExecutorService e = Executors.newSingleThreadExecutor(Executors.privilegedThreadFactory());
412          
413          Policy.setPolicy(savedPolicy);
414          e.execute(r);
415 <        e.shutdown();
415 >        try {
416 >            e.shutdown();
417 >        } catch(SecurityException ok) {
418 >        }
419          try {
420              Thread.sleep(SHORT_DELAY_MS);
421          } catch (Exception ex) {
# Line 297 | Line 426 | public class ExecutorsTest extends JSR16
426  
427      }
428  
429 +    static class CheckCCL implements Callable<Object> {
430 +        public Object call() {
431 +            AccessControlContext acc = AccessController.getContext();
432 +            acc.checkPermission(new RuntimePermission("getContextClassLoader"));
433 +            return null;
434 +        }
435 +    }
436 +
437 +
438 +    /**
439 +     * Without class loader permissions, creating
440 +     * privilegedCallableUsingCurrentClassLoader throws ACE
441 +     */
442 +    public void testCreatePrivilegedCallableUsingCCLWithNoPrivs() {
443 +        Policy savedPolicy = null;
444 +        try {
445 +            savedPolicy = Policy.getPolicy();
446 +            AdjustablePolicy policy = new AdjustablePolicy();
447 +            Policy.setPolicy(policy);
448 +        } catch (AccessControlException ok) {
449 +            return;
450 +        }
451 +
452 +        try {
453 +            Callable task = Executors.privilegedCallableUsingCurrentClassLoader(new NoOpCallable());
454 +            shouldThrow();
455 +        } catch(AccessControlException success) {
456 +        } catch(Exception ex) {
457 +            unexpectedException();
458 +        }
459 +        finally {
460 +            Policy.setPolicy(savedPolicy);
461 +        }
462 +    }
463 +
464 +    /**
465 +     * Without class loader permissions, calling
466 +     * privilegedCallableUsingCurrentClassLoader throws ACE
467 +     */
468 +    public void testprivilegedCallableUsingCCLWithPrivs() {
469 +        Policy savedPolicy = null;
470 +        try {
471 +            savedPolicy = Policy.getPolicy();
472 +            AdjustablePolicy policy = new AdjustablePolicy();
473 +            policy.addPermission(new RuntimePermission("getContextClassLoader"));
474 +            policy.addPermission(new RuntimePermission("setContextClassLoader"));
475 +            Policy.setPolicy(policy);
476 +        } catch (AccessControlException ok) {
477 +            return;
478 +        }
479 +            
480 +        try {
481 +            Callable task = Executors.privilegedCallableUsingCurrentClassLoader(new NoOpCallable());
482 +            task.call();
483 +        } catch(Exception ex) {
484 +            unexpectedException();
485 +        }
486 +        finally {
487 +            Policy.setPolicy(savedPolicy);
488 +        }
489 +    }
490 +
491 +    /**
492 +     * Without permissions, calling privilegedCallable throws ACE
493 +     */
494 +    public void testprivilegedCallableWithNoPrivs() {
495 +        Policy savedPolicy = null;
496 +        try {
497 +            savedPolicy = Policy.getPolicy();
498 +            AdjustablePolicy policy = new AdjustablePolicy();
499 +            Policy.setPolicy(policy);
500 +        } catch (AccessControlException ok) {
501 +            return;
502 +        }
503 +
504 +        Callable task = Executors.privilegedCallable(new CheckCCL());
505 +        Policy.setPolicy(savedPolicy);
506 +        try {
507 +            task.call();
508 +            shouldThrow();
509 +        } catch(AccessControlException success) {
510 +        } catch(Exception ex) {
511 +            unexpectedException();
512 +        } finally {
513 +        }
514 +    }
515 +
516 +    /**
517 +     * With permissions, calling privilegedCallable succeeds
518 +     */
519 +    public void testprivilegedCallableWithPrivs() {
520 +        Policy savedPolicy = null;
521 +        try {
522 +            savedPolicy = Policy.getPolicy();
523 +            AdjustablePolicy policy = new AdjustablePolicy();
524 +            policy.addPermission(new RuntimePermission("getContextClassLoader"));
525 +            policy.addPermission(new RuntimePermission("setContextClassLoader"));
526 +            Policy.setPolicy(policy);
527 +        } catch (AccessControlException ok) {
528 +            return;
529 +        }
530 +            
531 +        Callable task = Executors.privilegedCallable(new CheckCCL());
532 +        try {
533 +            task.call();
534 +        } catch(Exception ex) {
535 +            unexpectedException();
536 +        } finally {
537 +            Policy.setPolicy(savedPolicy);
538 +        }
539 +    }
540 +
541 +    /**
542 +     * callable(Runnable) returns null when called
543 +     */
544 +    public void testCallable1() {
545 +        try {
546 +            Callable c = Executors.callable(new NoOpRunnable());
547 +            assertNull(c.call());
548 +        } catch(Exception ex) {
549 +            unexpectedException();
550 +        }
551 +        
552 +    }
553 +
554 +    /**
555 +     * callable(Runnable, result) returns result when called
556 +     */
557 +    public void testCallable2() {
558 +        try {
559 +            Callable c = Executors.callable(new NoOpRunnable(), one);
560 +            assertEquals(one, c.call());
561 +        } catch(Exception ex) {
562 +            unexpectedException();
563 +        }
564 +    }
565 +
566 +    /**
567 +     * callable(PrivilegedAction) returns its result when called
568 +     */
569 +    public void testCallable3() {
570 +        try {
571 +            Callable c = Executors.callable(new PrivilegedAction() {
572 +                    public Object run() { return one; }});
573 +        assertEquals(one, c.call());
574 +        } catch(Exception ex) {
575 +            unexpectedException();
576 +        }
577 +    }
578 +
579 +    /**
580 +     * callable(PrivilegedExceptionAction) returns its result when called
581 +     */
582 +    public void testCallable4() {
583 +        try {
584 +            Callable c = Executors.callable(new PrivilegedExceptionAction() {
585 +                    public Object run() { return one; }});
586 +            assertEquals(one, c.call());
587 +        } catch(Exception ex) {
588 +            unexpectedException();
589 +        }
590 +    }
591 +
592 +
593 +    /**
594 +     * callable(null Runnable) throws NPE
595 +     */
596 +    public void testCallableNPE1() {
597 +        try {
598 +            Runnable r = null;
599 +            Callable c = Executors.callable(r);
600 +        } catch (NullPointerException success) {
601 +        }
602 +    }
603 +
604 +    /**
605 +     * callable(null, result) throws NPE
606 +     */
607 +    public void testCallableNPE2() {
608 +        try {
609 +            Runnable r = null;
610 +            Callable c = Executors.callable(r, one);
611 +        } catch (NullPointerException success) {
612 +        }
613 +    }
614 +
615 +    /**
616 +     * callable(null PrivilegedAction) throws NPE
617 +     */
618 +    public void testCallableNPE3() {
619 +        try {
620 +            PrivilegedAction r = null;
621 +            Callable c = Executors.callable(r);
622 +        } catch (NullPointerException success) {
623 +        }
624 +    }
625 +
626 +    /**
627 +     * callable(null PrivilegedExceptionAction) throws NPE
628 +     */
629 +    public void testCallableNPE4() {
630 +        try {
631 +            PrivilegedExceptionAction r = null;
632 +            Callable c = Executors.callable(r);
633 +        } catch (NullPointerException success) {
634 +        }
635 +    }
636 +
637 +
638   }

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines