ViewVC Help
View File | Revision Log | Show Annotations | Download File | Root Listing
root/jsr166/jsr166/src/test/tck/ExecutorsTest.java
(Generate patch)

Comparing jsr166/src/test/tck/ExecutorsTest.java (file contents):
Revision 1.10 by tim, Wed Dec 10 01:51:12 2003 UTC vs.
Revision 1.17 by dl, Mon Apr 3 15:00:59 2006 UTC

# Line 1 | Line 1
1   /*
2 < * Written by members of JCP JSR-166 Expert Group and released to the
3 < * public domain. Use, modify, and redistribute this code in any way
4 < * without acknowledgement. Other contributors include Andrew Wright,
5 < * Jeffrey Hayes, Pat Fischer, Mike Judd.
2 > * Written by Doug Lea with assistance from members of JCP JSR-166
3 > * Expert Group and released to the public domain, as explained at
4 > * http://creativecommons.org/licenses/publicdomain
5 > * Other contributors include Andrew Wright, Jeffrey Hayes,
6 > * Pat Fisher, Mike Judd.
7   */
8  
9  
# Line 68 | Line 69 | public class ExecutorsTest extends JSR16
69          e.execute(new NoOpRunnable());
70          e.execute(new NoOpRunnable());
71          e.execute(new NoOpRunnable());
72 <        e.shutdown();
72 >        joinPool(e);
73      }
74  
75      /**
# Line 79 | Line 80 | public class ExecutorsTest extends JSR16
80          e.execute(new NoOpRunnable());
81          e.execute(new NoOpRunnable());
82          e.execute(new NoOpRunnable());
83 <        e.shutdown();
83 >        joinPool(e);
84      }
85  
86      /**
# Line 103 | Line 104 | public class ExecutorsTest extends JSR16
104          e.execute(new NoOpRunnable());
105          e.execute(new NoOpRunnable());
106          e.execute(new NoOpRunnable());
107 <        e.shutdown();
107 >        joinPool(e);
108      }
109  
110      /**
# Line 114 | Line 115 | public class ExecutorsTest extends JSR16
115          e.execute(new NoOpRunnable());
116          e.execute(new NoOpRunnable());
117          e.execute(new NoOpRunnable());
118 <        e.shutdown();
118 >        joinPool(e);
119      }
120  
121      /**
# Line 130 | Line 131 | public class ExecutorsTest extends JSR16
131      }
132  
133      /**
134 +     * A new SingleThreadExecutor cannot be casted to concrete implementation
135 +     */
136 +    public void testCastNewSingleThreadExecutor() {
137 +        ExecutorService e = Executors.newSingleThreadExecutor();
138 +        try {
139 +            ThreadPoolExecutor tpe = (ThreadPoolExecutor)e;
140 +        } catch (ClassCastException success) {
141 +        } finally {
142 +            joinPool(e);
143 +        }
144 +    }
145 +
146 +
147 +    /**
148       * A new newFixedThreadPool can execute runnables
149       */
150      public void testNewFixedThreadPool1() {
# Line 137 | Line 152 | public class ExecutorsTest extends JSR16
152          e.execute(new NoOpRunnable());
153          e.execute(new NoOpRunnable());
154          e.execute(new NoOpRunnable());
155 <        e.shutdown();
155 >        joinPool(e);
156      }
157  
158      /**
# Line 148 | Line 163 | public class ExecutorsTest extends JSR16
163          e.execute(new NoOpRunnable());
164          e.execute(new NoOpRunnable());
165          e.execute(new NoOpRunnable());
166 <        e.shutdown();
166 >        joinPool(e);
167      }
168  
169      /**
# Line 177 | Line 192 | public class ExecutorsTest extends JSR16
192  
193  
194      /**
195 +     * An unconfigurable newFixedThreadPool can execute runnables
196 +     */
197 +    public void testunconfigurableExecutorService() {
198 +        ExecutorService e = Executors.unconfigurableExecutorService(Executors.newFixedThreadPool(2));
199 +        e.execute(new NoOpRunnable());
200 +        e.execute(new NoOpRunnable());
201 +        e.execute(new NoOpRunnable());
202 +        joinPool(e);
203 +    }
204 +
205 +    /**
206 +     * unconfigurableExecutorService(null) throws NPE
207 +     */
208 +    public void testunconfigurableExecutorServiceNPE() {
209 +        try {
210 +            ExecutorService e = Executors.unconfigurableExecutorService(null);
211 +        }
212 +        catch (NullPointerException success) {
213 +        }
214 +    }
215 +
216 +    /**
217 +     * unconfigurableScheduledExecutorService(null) throws NPE
218 +     */
219 +    public void testunconfigurableScheduledExecutorServiceNPE() {
220 +        try {
221 +            ExecutorService e = Executors.unconfigurableScheduledExecutorService(null);
222 +        }
223 +        catch (NullPointerException success) {
224 +        }
225 +    }
226 +
227 +
228 +    /**
229 +     * a newSingleThreadScheduledExecutor successfully runs delayed task
230 +     */
231 +    public void testNewSingleThreadScheduledExecutor() {
232 +        try {
233 +            TrackedCallable callable = new TrackedCallable();
234 +            ScheduledExecutorService p1 = Executors.newSingleThreadScheduledExecutor();
235 +            Future f = p1.schedule(callable, SHORT_DELAY_MS, TimeUnit.MILLISECONDS);
236 +            assertFalse(callable.done);
237 +            Thread.sleep(MEDIUM_DELAY_MS);
238 +            assertTrue(callable.done);
239 +            assertEquals(Boolean.TRUE, f.get());
240 +            joinPool(p1);
241 +        } catch(RejectedExecutionException e){}
242 +        catch(Exception e){
243 +            e.printStackTrace();
244 +            unexpectedException();
245 +        }
246 +    }
247 +
248 +    /**
249 +     * a newScheduledThreadPool successfully runs delayed task
250 +     */
251 +    public void testnewScheduledThreadPool() {
252 +        try {
253 +            TrackedCallable callable = new TrackedCallable();
254 +            ScheduledExecutorService p1 = Executors.newScheduledThreadPool(2);
255 +            Future f = p1.schedule(callable, SHORT_DELAY_MS, TimeUnit.MILLISECONDS);
256 +            assertFalse(callable.done);
257 +            Thread.sleep(MEDIUM_DELAY_MS);
258 +            assertTrue(callable.done);
259 +            assertEquals(Boolean.TRUE, f.get());
260 +            joinPool(p1);
261 +        } catch(RejectedExecutionException e){}
262 +        catch(Exception e){
263 +            e.printStackTrace();
264 +            unexpectedException();
265 +        }
266 +    }
267 +
268 +    /**
269 +     * an unconfigurable  newScheduledThreadPool successfully runs delayed task
270 +     */
271 +    public void testunconfigurableScheduledExecutorService() {
272 +        try {
273 +            TrackedCallable callable = new TrackedCallable();
274 +            ScheduledExecutorService p1 = Executors.unconfigurableScheduledExecutorService(Executors.newScheduledThreadPool(2));
275 +            Future f = p1.schedule(callable, SHORT_DELAY_MS, TimeUnit.MILLISECONDS);
276 +            assertFalse(callable.done);
277 +            Thread.sleep(MEDIUM_DELAY_MS);
278 +            assertTrue(callable.done);
279 +            assertEquals(Boolean.TRUE, f.get());
280 +            joinPool(p1);
281 +        } catch(RejectedExecutionException e){}
282 +        catch(Exception e){
283 +            e.printStackTrace();
284 +            unexpectedException();
285 +        }
286 +    }
287 +
288 +    /**
289       *  timeouts from execute will time out if they compute too long.
290       */
291      public void testTimedCallable() {
# Line 225 | Line 334 | public class ExecutorsTest extends JSR16
334          final ThreadGroup egroup = Thread.currentThread().getThreadGroup();
335          Runnable r = new Runnable() {
336                  public void run() {
337 <                    Thread current = Thread.currentThread();
338 <                    threadAssertTrue(!current.isDaemon());
339 <                    threadAssertTrue(current.getPriority() == Thread.NORM_PRIORITY);
340 <                    ThreadGroup g = current.getThreadGroup();
341 <                    SecurityManager s = System.getSecurityManager();
342 <                    if (s != null)
343 <                        threadAssertTrue(g == s.getThreadGroup());
344 <                    else
345 <                        threadAssertTrue(g == egroup);
346 <                    String name = current.getName();
347 <                    threadAssertTrue(name.endsWith("thread-1"));
337 >                    try {
338 >                        Thread current = Thread.currentThread();
339 >                        threadAssertTrue(!current.isDaemon());
340 >                        threadAssertTrue(current.getPriority() <= Thread.NORM_PRIORITY);
341 >                        ThreadGroup g = current.getThreadGroup();
342 >                        SecurityManager s = System.getSecurityManager();
343 >                        if (s != null)
344 >                            threadAssertTrue(g == s.getThreadGroup());
345 >                        else
346 >                            threadAssertTrue(g == egroup);
347 >                        String name = current.getName();
348 >                        threadAssertTrue(name.endsWith("thread-1"));
349 >                    } catch (SecurityException ok) {
350 >                        // Also pass if not allowed to change setting
351 >                    }
352                  }
353              };
354          ExecutorService e = Executors.newSingleThreadExecutor(Executors.defaultThreadFactory());
355          
356          e.execute(r);
357 <        e.shutdown();
357 >        try {
358 >            e.shutdown();
359 >        } catch(SecurityException ok) {
360 >        }
361 >        
362          try {
363              Thread.sleep(SHORT_DELAY_MS);
364          } catch (Exception eX) {
# Line 257 | Line 374 | public class ExecutorsTest extends JSR16
374       * access control context and context class loader
375       */
376      public void testPrivilegedThreadFactory() {
377 <        Policy savedPolicy = Policy.getPolicy();
378 <        AdjustablePolicy policy = new AdjustablePolicy();
379 <        policy.addPermission(new RuntimePermission("getContextClassLoader"));
380 <        policy.addPermission(new RuntimePermission("setContextClassLoader"));
381 <        Policy.setPolicy(policy);
377 >        Policy savedPolicy = null;
378 >        try {
379 >            savedPolicy = Policy.getPolicy();
380 >            AdjustablePolicy policy = new AdjustablePolicy();
381 >            policy.addPermission(new RuntimePermission("getContextClassLoader"));
382 >            policy.addPermission(new RuntimePermission("setContextClassLoader"));
383 >            Policy.setPolicy(policy);
384 >        } catch (AccessControlException ok) {
385 >            return;
386 >        }
387          final ThreadGroup egroup = Thread.currentThread().getThreadGroup();
388          final ClassLoader thisccl = Thread.currentThread().getContextClassLoader();
389          final AccessControlContext thisacc = AccessController.getContext();
390          Runnable r = new Runnable() {
391                  public void run() {
392 <                    Thread current = Thread.currentThread();
393 <                    threadAssertTrue(!current.isDaemon());
394 <                    threadAssertTrue(current.getPriority() == Thread.NORM_PRIORITY);
395 <                    ThreadGroup g = current.getThreadGroup();
396 <                    SecurityManager s = System.getSecurityManager();
397 <                    if (s != null)
398 <                        threadAssertTrue(g == s.getThreadGroup());
399 <                    else
400 <                        threadAssertTrue(g == egroup);
401 <                    String name = current.getName();
402 <                    threadAssertTrue(name.endsWith("thread-1"));
403 <                    threadAssertTrue(thisccl == current.getContextClassLoader());
404 <                    threadAssertTrue(thisacc.equals(AccessController.getContext()));
392 >                    try {
393 >                        Thread current = Thread.currentThread();
394 >                        threadAssertTrue(!current.isDaemon());
395 >                        threadAssertTrue(current.getPriority() <= Thread.NORM_PRIORITY);
396 >                        ThreadGroup g = current.getThreadGroup();
397 >                        SecurityManager s = System.getSecurityManager();
398 >                        if (s != null)
399 >                            threadAssertTrue(g == s.getThreadGroup());
400 >                        else
401 >                            threadAssertTrue(g == egroup);
402 >                        String name = current.getName();
403 >                        threadAssertTrue(name.endsWith("thread-1"));
404 >                        threadAssertTrue(thisccl == current.getContextClassLoader());
405 >                        threadAssertTrue(thisacc.equals(AccessController.getContext()));
406 >                    } catch(SecurityException ok) {
407 >                        // Also pass if not allowed to change settings
408 >                    }
409                  }
410              };
411          ExecutorService e = Executors.newSingleThreadExecutor(Executors.privilegedThreadFactory());
412          
413          Policy.setPolicy(savedPolicy);
414          e.execute(r);
415 <        e.shutdown();
415 >        try {
416 >            e.shutdown();
417 >        } catch(SecurityException ok) {
418 >        }
419          try {
420              Thread.sleep(SHORT_DELAY_MS);
421          } catch (Exception ex) {
# Line 297 | Line 426 | public class ExecutorsTest extends JSR16
426  
427      }
428  
429 +    void checkCCL() {
430 +            AccessController.getContext().checkPermission(new RuntimePermission("getContextClassLoader"));
431 +    }
432 +
433 +    class CheckCCL implements Callable<Object> {
434 +        public Object call() {
435 +            checkCCL();
436 +            return null;
437 +        }
438 +    }
439 +
440 +
441 +    /**
442 +     * Without class loader permissions, creating
443 +     * privilegedCallableUsingCurrentClassLoader throws ACE
444 +     */
445 +    public void testCreatePrivilegedCallableUsingCCLWithNoPrivs() {
446 +        Policy savedPolicy = null;
447 +        try {
448 +            savedPolicy = Policy.getPolicy();
449 +            AdjustablePolicy policy = new AdjustablePolicy();
450 +            Policy.setPolicy(policy);
451 +        } catch (AccessControlException ok) {
452 +            return;
453 +        }
454 +
455 +        // Check if program still has too many permissions to run test
456 +        try {
457 +            checkCCL();
458 +            // too many privileges to test; so return
459 +            Policy.setPolicy(savedPolicy);
460 +            return;
461 +        } catch(AccessControlException ok) {
462 +        }
463 +
464 +        try {
465 +            Callable task = Executors.privilegedCallableUsingCurrentClassLoader(new NoOpCallable());
466 +            shouldThrow();
467 +        } catch(AccessControlException success) {
468 +        } catch(Exception ex) {
469 +            unexpectedException();
470 +        }
471 +        finally {
472 +            Policy.setPolicy(savedPolicy);
473 +        }
474 +    }
475 +
476 +    /**
477 +     * With class loader permissions, calling
478 +     * privilegedCallableUsingCurrentClassLoader does not throw ACE
479 +     */
480 +    public void testprivilegedCallableUsingCCLWithPrivs() {
481 +        Policy savedPolicy = null;
482 +        try {
483 +            savedPolicy = Policy.getPolicy();
484 +            AdjustablePolicy policy = new AdjustablePolicy();
485 +            policy.addPermission(new RuntimePermission("getContextClassLoader"));
486 +            policy.addPermission(new RuntimePermission("setContextClassLoader"));
487 +            Policy.setPolicy(policy);
488 +        } catch (AccessControlException ok) {
489 +            return;
490 +        }
491 +            
492 +        try {
493 +            Callable task = Executors.privilegedCallableUsingCurrentClassLoader(new NoOpCallable());
494 +            task.call();
495 +        } catch(Exception ex) {
496 +            unexpectedException();
497 +        }
498 +        finally {
499 +            Policy.setPolicy(savedPolicy);
500 +        }
501 +    }
502 +
503 +    /**
504 +     * Without permissions, calling privilegedCallable throws ACE
505 +     */
506 +    public void testprivilegedCallableWithNoPrivs() {
507 +        Callable task;
508 +        Policy savedPolicy = null;
509 +        AdjustablePolicy policy = null;
510 +        AccessControlContext noprivAcc = null;
511 +        try {
512 +            savedPolicy = Policy.getPolicy();
513 +            policy = new AdjustablePolicy();
514 +            Policy.setPolicy(policy);
515 +            noprivAcc = AccessController.getContext();
516 +            task = Executors.privilegedCallable(new CheckCCL());
517 +            Policy.setPolicy(savedPolicy);
518 +        } catch (AccessControlException ok) {
519 +            return; // program has too few permissions to set up test
520 +        }
521 +
522 +        // Make sure that program doesn't have too many permissions
523 +        try {
524 +            AccessController.doPrivileged(new PrivilegedAction() {
525 +                    public Object run() {
526 +                        checkCCL();
527 +                        return null;
528 +                    }}, noprivAcc);
529 +            // too many permssions; skip test
530 +            return;
531 +        } catch(AccessControlException ok) {
532 +        }
533 +
534 +        try {
535 +            task.call();
536 +            shouldThrow();
537 +        } catch(AccessControlException success) {
538 +        } catch(Exception ex) {
539 +            unexpectedException();
540 +        }
541 +    }
542 +
543 +    /**
544 +     * With permissions, calling privilegedCallable succeeds
545 +     */
546 +    public void testprivilegedCallableWithPrivs() {
547 +        Policy savedPolicy = null;
548 +        try {
549 +            savedPolicy = Policy.getPolicy();
550 +            AdjustablePolicy policy = new AdjustablePolicy();
551 +            policy.addPermission(new RuntimePermission("getContextClassLoader"));
552 +            policy.addPermission(new RuntimePermission("setContextClassLoader"));
553 +            Policy.setPolicy(policy);
554 +        } catch (AccessControlException ok) {
555 +            return;
556 +        }
557 +            
558 +        Callable task = Executors.privilegedCallable(new CheckCCL());
559 +        try {
560 +            task.call();
561 +        } catch(Exception ex) {
562 +            unexpectedException();
563 +        } finally {
564 +            Policy.setPolicy(savedPolicy);
565 +        }
566 +    }
567 +
568 +    /**
569 +     * callable(Runnable) returns null when called
570 +     */
571 +    public void testCallable1() {
572 +        try {
573 +            Callable c = Executors.callable(new NoOpRunnable());
574 +            assertNull(c.call());
575 +        } catch(Exception ex) {
576 +            unexpectedException();
577 +        }
578 +        
579 +    }
580 +
581 +    /**
582 +     * callable(Runnable, result) returns result when called
583 +     */
584 +    public void testCallable2() {
585 +        try {
586 +            Callable c = Executors.callable(new NoOpRunnable(), one);
587 +            assertEquals(one, c.call());
588 +        } catch(Exception ex) {
589 +            unexpectedException();
590 +        }
591 +    }
592 +
593 +    /**
594 +     * callable(PrivilegedAction) returns its result when called
595 +     */
596 +    public void testCallable3() {
597 +        try {
598 +            Callable c = Executors.callable(new PrivilegedAction() {
599 +                    public Object run() { return one; }});
600 +        assertEquals(one, c.call());
601 +        } catch(Exception ex) {
602 +            unexpectedException();
603 +        }
604 +    }
605 +
606 +    /**
607 +     * callable(PrivilegedExceptionAction) returns its result when called
608 +     */
609 +    public void testCallable4() {
610 +        try {
611 +            Callable c = Executors.callable(new PrivilegedExceptionAction() {
612 +                    public Object run() { return one; }});
613 +            assertEquals(one, c.call());
614 +        } catch(Exception ex) {
615 +            unexpectedException();
616 +        }
617 +    }
618 +
619 +
620 +    /**
621 +     * callable(null Runnable) throws NPE
622 +     */
623 +    public void testCallableNPE1() {
624 +        try {
625 +            Runnable r = null;
626 +            Callable c = Executors.callable(r);
627 +        } catch (NullPointerException success) {
628 +        }
629 +    }
630 +
631 +    /**
632 +     * callable(null, result) throws NPE
633 +     */
634 +    public void testCallableNPE2() {
635 +        try {
636 +            Runnable r = null;
637 +            Callable c = Executors.callable(r, one);
638 +        } catch (NullPointerException success) {
639 +        }
640 +    }
641 +
642 +    /**
643 +     * callable(null PrivilegedAction) throws NPE
644 +     */
645 +    public void testCallableNPE3() {
646 +        try {
647 +            PrivilegedAction r = null;
648 +            Callable c = Executors.callable(r);
649 +        } catch (NullPointerException success) {
650 +        }
651 +    }
652 +
653 +    /**
654 +     * callable(null PrivilegedExceptionAction) throws NPE
655 +     */
656 +    public void testCallableNPE4() {
657 +        try {
658 +            PrivilegedExceptionAction r = null;
659 +            Callable c = Executors.callable(r);
660 +        } catch (NullPointerException success) {
661 +        }
662 +    }
663 +
664 +
665   }

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines