ViewVC Help
View File | Revision Log | Show Annotations | Download File | Root Listing
root/jsr166/jsr166/src/test/tck/ExecutorsTest.java
(Generate patch)

Comparing jsr166/src/test/tck/ExecutorsTest.java (file contents):
Revision 1.10 by tim, Wed Dec 10 01:51:12 2003 UTC vs.
Revision 1.44 by jsr166, Sun Feb 22 19:16:12 2015 UTC

# Line 1 | Line 1
1   /*
2 < * Written by members of JCP JSR-166 Expert Group and released to the
3 < * public domain. Use, modify, and redistribute this code in any way
4 < * without acknowledgement. Other contributors include Andrew Wright,
5 < * Jeffrey Hayes, Pat Fischer, Mike Judd.
2 > * Written by Doug Lea with assistance from members of JCP JSR-166
3 > * Expert Group and released to the public domain, as explained at
4 > * http://creativecommons.org/publicdomain/zero/1.0/
5 > * Other contributors include Andrew Wright, Jeffrey Hayes,
6 > * Pat Fisher, Mike Judd.
7   */
8  
9 + import static java.util.concurrent.TimeUnit.MILLISECONDS;
10  
11 < import junit.framework.*;
12 < import java.util.*;
13 < import java.util.concurrent.*;
14 < import java.math.BigInteger;
15 < import java.security.*;
11 > import java.security.AccessControlContext;
12 > import java.security.AccessControlException;
13 > import java.security.AccessController;
14 > import java.security.PrivilegedAction;
15 > import java.security.PrivilegedExceptionAction;
16 > import java.util.ArrayList;
17 > import java.util.List;
18 > import java.util.concurrent.Callable;
19 > import java.util.concurrent.CountDownLatch;
20 > import java.util.concurrent.Executors;
21 > import java.util.concurrent.ExecutorService;
22 > import java.util.concurrent.Future;
23 > import java.util.concurrent.ScheduledExecutorService;
24 > import java.util.concurrent.ThreadPoolExecutor;
25  
26 < public class ExecutorsTest extends JSR166TestCase{
26 > import junit.framework.Test;
27 > import junit.framework.TestSuite;
28 >
29 > public class ExecutorsTest extends JSR166TestCase {
30      public static void main(String[] args) {
31 <        junit.textui.TestRunner.run (suite());  
31 >        junit.textui.TestRunner.run(suite());
32      }
33      public static Test suite() {
34          return new TestSuite(ExecutorsTest.class);
35      }
36  
23    static class TimedCallable<T> implements Callable<T> {
24        private final ExecutorService exec;
25        private final Callable<T> func;
26        private final long msecs;
27        
28        TimedCallable(ExecutorService exec, Callable<T> func, long msecs) {
29            this.exec = exec;
30            this.func = func;
31            this.msecs = msecs;
32        }
33        
34        public T call() throws Exception {
35            Future<T> ftask = exec.submit(func);
36            try {
37                return ftask.get(msecs, TimeUnit.MILLISECONDS);
38            } finally {
39                ftask.cancel(true);
40            }
41        }
42    }
43
44
45    private static class Fib implements Callable<BigInteger> {
46        private final BigInteger n;
47        Fib(long n) {
48            if (n < 0) throw new IllegalArgumentException("need non-negative arg, but got " + n);
49            this.n = BigInteger.valueOf(n);
50        }
51        public BigInteger call() {
52            BigInteger f1 = BigInteger.ONE;
53            BigInteger f2 = f1;
54            for (BigInteger i = BigInteger.ZERO; i.compareTo(n) < 0; i = i.add(BigInteger.ONE)) {
55                BigInteger t = f1.add(f2);
56                f1 = f2;
57                f2 = t;
58            }
59            return f1;
60        }
61    };
62
37      /**
38       * A newCachedThreadPool can execute runnables
39       */
# Line 68 | Line 42 | public class ExecutorsTest extends JSR16
42          e.execute(new NoOpRunnable());
43          e.execute(new NoOpRunnable());
44          e.execute(new NoOpRunnable());
45 <        e.shutdown();
45 >        joinPool(e);
46      }
47  
48      /**
# Line 79 | Line 53 | public class ExecutorsTest extends JSR16
53          e.execute(new NoOpRunnable());
54          e.execute(new NoOpRunnable());
55          e.execute(new NoOpRunnable());
56 <        e.shutdown();
56 >        joinPool(e);
57      }
58  
59      /**
# Line 89 | Line 63 | public class ExecutorsTest extends JSR16
63          try {
64              ExecutorService e = Executors.newCachedThreadPool(null);
65              shouldThrow();
66 <        }
93 <        catch(NullPointerException success) {
94 <        }
66 >        } catch (NullPointerException success) {}
67      }
68  
97
69      /**
70       * A new SingleThreadExecutor can execute runnables
71       */
# Line 103 | Line 74 | public class ExecutorsTest extends JSR16
74          e.execute(new NoOpRunnable());
75          e.execute(new NoOpRunnable());
76          e.execute(new NoOpRunnable());
77 <        e.shutdown();
77 >        joinPool(e);
78      }
79  
80      /**
# Line 114 | Line 85 | public class ExecutorsTest extends JSR16
85          e.execute(new NoOpRunnable());
86          e.execute(new NoOpRunnable());
87          e.execute(new NoOpRunnable());
88 <        e.shutdown();
88 >        joinPool(e);
89      }
90  
91      /**
# Line 124 | Line 95 | public class ExecutorsTest extends JSR16
95          try {
96              ExecutorService e = Executors.newSingleThreadExecutor(null);
97              shouldThrow();
98 <        }
99 <        catch(NullPointerException success) {
98 >        } catch (NullPointerException success) {}
99 >    }
100 >
101 >    /**
102 >     * A new SingleThreadExecutor cannot be casted to concrete implementation
103 >     */
104 >    public void testCastNewSingleThreadExecutor() {
105 >        ExecutorService e = Executors.newSingleThreadExecutor();
106 >        try {
107 >            ThreadPoolExecutor tpe = (ThreadPoolExecutor)e;
108 >            shouldThrow();
109 >        } catch (ClassCastException success) {
110 >        } finally {
111 >            joinPool(e);
112          }
113      }
114  
# Line 137 | Line 120 | public class ExecutorsTest extends JSR16
120          e.execute(new NoOpRunnable());
121          e.execute(new NoOpRunnable());
122          e.execute(new NoOpRunnable());
123 <        e.shutdown();
123 >        joinPool(e);
124      }
125  
126      /**
# Line 148 | Line 131 | public class ExecutorsTest extends JSR16
131          e.execute(new NoOpRunnable());
132          e.execute(new NoOpRunnable());
133          e.execute(new NoOpRunnable());
134 <        e.shutdown();
134 >        joinPool(e);
135      }
136  
137      /**
# Line 158 | Line 141 | public class ExecutorsTest extends JSR16
141          try {
142              ExecutorService e = Executors.newFixedThreadPool(2, null);
143              shouldThrow();
144 <        }
162 <        catch(NullPointerException success) {
163 <        }
144 >        } catch (NullPointerException success) {}
145      }
146  
147      /**
# Line 170 | Line 151 | public class ExecutorsTest extends JSR16
151          try {
152              ExecutorService e = Executors.newFixedThreadPool(0);
153              shouldThrow();
154 +        } catch (IllegalArgumentException success) {}
155 +    }
156 +
157 +    /**
158 +     * An unconfigurable newFixedThreadPool can execute runnables
159 +     */
160 +    public void testUnconfigurableExecutorService() {
161 +        ExecutorService e = Executors.unconfigurableExecutorService(Executors.newFixedThreadPool(2));
162 +        e.execute(new NoOpRunnable());
163 +        e.execute(new NoOpRunnable());
164 +        e.execute(new NoOpRunnable());
165 +        joinPool(e);
166 +    }
167 +
168 +    /**
169 +     * unconfigurableExecutorService(null) throws NPE
170 +     */
171 +    public void testUnconfigurableExecutorServiceNPE() {
172 +        try {
173 +            ExecutorService e = Executors.unconfigurableExecutorService(null);
174 +            shouldThrow();
175 +        } catch (NullPointerException success) {}
176 +    }
177 +
178 +    /**
179 +     * unconfigurableScheduledExecutorService(null) throws NPE
180 +     */
181 +    public void testUnconfigurableScheduledExecutorServiceNPE() {
182 +        try {
183 +            ExecutorService e = Executors.unconfigurableScheduledExecutorService(null);
184 +            shouldThrow();
185 +        } catch (NullPointerException success) {}
186 +    }
187 +
188 +    /**
189 +     * a newSingleThreadScheduledExecutor successfully runs delayed task
190 +     */
191 +    public void testNewSingleThreadScheduledExecutor() throws Exception {
192 +        ScheduledExecutorService p = Executors.newSingleThreadScheduledExecutor();
193 +        try {
194 +            final CountDownLatch proceed = new CountDownLatch(1);
195 +            final Runnable task = new CheckedRunnable() {
196 +                public void realRun() {
197 +                    await(proceed);
198 +                }};
199 +            long startTime = System.nanoTime();
200 +            Future f = p.schedule(Executors.callable(task, Boolean.TRUE),
201 +                                  timeoutMillis(), MILLISECONDS);
202 +            assertFalse(f.isDone());
203 +            proceed.countDown();
204 +            assertSame(Boolean.TRUE, f.get(LONG_DELAY_MS, MILLISECONDS));
205 +            assertSame(Boolean.TRUE, f.get());
206 +            assertTrue(f.isDone());
207 +            assertFalse(f.isCancelled());
208 +            assertTrue(millisElapsedSince(startTime) >= timeoutMillis());
209 +        } finally {
210 +            joinPool(p);
211          }
212 <        catch(IllegalArgumentException success) {
212 >    }
213 >
214 >    /**
215 >     * a newScheduledThreadPool successfully runs delayed task
216 >     */
217 >    public void testNewScheduledThreadPool() throws Exception {
218 >        ScheduledExecutorService p = Executors.newScheduledThreadPool(2);
219 >        try {
220 >            final CountDownLatch proceed = new CountDownLatch(1);
221 >            final Runnable task = new CheckedRunnable() {
222 >                public void realRun() {
223 >                    await(proceed);
224 >                }};
225 >            long startTime = System.nanoTime();
226 >            Future f = p.schedule(Executors.callable(task, Boolean.TRUE),
227 >                                  timeoutMillis(), MILLISECONDS);
228 >            assertFalse(f.isDone());
229 >            proceed.countDown();
230 >            assertSame(Boolean.TRUE, f.get(LONG_DELAY_MS, MILLISECONDS));
231 >            assertSame(Boolean.TRUE, f.get());
232 >            assertTrue(f.isDone());
233 >            assertFalse(f.isCancelled());
234 >            assertTrue(millisElapsedSince(startTime) >= timeoutMillis());
235 >        } finally {
236 >            joinPool(p);
237          }
238      }
239  
240 +    /**
241 +     * an unconfigurable newScheduledThreadPool successfully runs delayed task
242 +     */
243 +    public void testUnconfigurableScheduledExecutorService() throws Exception {
244 +        ScheduledExecutorService p =
245 +            Executors.unconfigurableScheduledExecutorService
246 +            (Executors.newScheduledThreadPool(2));
247 +        try {
248 +            final CountDownLatch proceed = new CountDownLatch(1);
249 +            final Runnable task = new CheckedRunnable() {
250 +                public void realRun() {
251 +                    await(proceed);
252 +                }};
253 +            long startTime = System.nanoTime();
254 +            Future f = p.schedule(Executors.callable(task, Boolean.TRUE),
255 +                                  timeoutMillis(), MILLISECONDS);
256 +            assertFalse(f.isDone());
257 +            proceed.countDown();
258 +            assertSame(Boolean.TRUE, f.get(LONG_DELAY_MS, MILLISECONDS));
259 +            assertSame(Boolean.TRUE, f.get());
260 +            assertTrue(f.isDone());
261 +            assertFalse(f.isCancelled());
262 +            assertTrue(millisElapsedSince(startTime) >= timeoutMillis());
263 +        } finally {
264 +            joinPool(p);
265 +        }
266 +    }
267  
268      /**
269 <     *  timeouts from execute will time out if they compute too long.
269 >     * Future.get on submitted tasks will time out if they compute too long.
270       */
271 <    public void testTimedCallable() {
272 <        int N = 10000;
273 <        ExecutorService executor = Executors.newSingleThreadExecutor();
274 <        List<Callable<BigInteger>> tasks = new ArrayList<Callable<BigInteger>>(N);
275 <        try {
276 <            long startTime = System.currentTimeMillis();
277 <            
278 <            long i = 0;
279 <            while (tasks.size() < N) {
280 <                tasks.add(new TimedCallable<BigInteger>(executor, new Fib(i), 1));
281 <                i += 10;
282 <            }
283 <            
284 <            int iters = 0;
285 <            BigInteger sum = BigInteger.ZERO;
286 <            for (Iterator<Callable<BigInteger>> it = tasks.iterator(); it.hasNext();) {
287 <                try {
288 <                    ++iters;
289 <                    sum = sum.add(it.next().call());
290 <                }
202 <                catch (TimeoutException success) {
203 <                    assertTrue(iters > 0);
204 <                    return;
205 <                }
206 <                catch (Exception e) {
207 <                    unexpectedException();
208 <                }
209 <            }
210 <            // if by chance we didn't ever time out, total time must be small
211 <            long elapsed = System.currentTimeMillis() - startTime;
212 <            assertTrue(elapsed < N);
271 >    public void testTimedCallable() throws Exception {
272 >        final ExecutorService[] executors = {
273 >            Executors.newSingleThreadExecutor(),
274 >            Executors.newCachedThreadPool(),
275 >            Executors.newFixedThreadPool(2),
276 >            Executors.newScheduledThreadPool(2),
277 >        };
278 >
279 >        final Runnable sleeper = new CheckedInterruptedRunnable() {
280 >            public void realRun() throws InterruptedException {
281 >                delay(LONG_DELAY_MS);
282 >            }};
283 >
284 >        List<Thread> threads = new ArrayList<Thread>();
285 >        for (final ExecutorService executor : executors) {
286 >            threads.add(newStartedThread(new CheckedRunnable() {
287 >                public void realRun() {
288 >                    Future future = executor.submit(sleeper);
289 >                    assertFutureTimesOut(future);
290 >                }}));
291          }
292 <        finally {
292 >        for (Thread thread : threads)
293 >            awaitTermination(thread);
294 >        for (ExecutorService executor : executors)
295              joinPool(executor);
216        }
296      }
297  
219    
298      /**
299       * ThreadPoolExecutor using defaultThreadFactory has
300       * specified group, priority, daemon status, and name
301       */
302 <    public void testDefaultThreadFactory() {
302 >    public void testDefaultThreadFactory() throws Exception {
303          final ThreadGroup egroup = Thread.currentThread().getThreadGroup();
304 <        Runnable r = new Runnable() {
305 <                public void run() {
304 >        final CountDownLatch done = new CountDownLatch(1);
305 >        Runnable r = new CheckedRunnable() {
306 >            public void realRun() {
307 >                try {
308                      Thread current = Thread.currentThread();
309 <                    threadAssertTrue(!current.isDaemon());
310 <                    threadAssertTrue(current.getPriority() == Thread.NORM_PRIORITY);
309 >                    assertTrue(!current.isDaemon());
310 >                    assertTrue(current.getPriority() <= Thread.NORM_PRIORITY);
311                      ThreadGroup g = current.getThreadGroup();
312                      SecurityManager s = System.getSecurityManager();
313                      if (s != null)
314 <                        threadAssertTrue(g == s.getThreadGroup());
314 >                        assertTrue(g == s.getThreadGroup());
315                      else
316 <                        threadAssertTrue(g == egroup);
316 >                        assertTrue(g == egroup);
317                      String name = current.getName();
318 <                    threadAssertTrue(name.endsWith("thread-1"));
318 >                    assertTrue(name.endsWith("thread-1"));
319 >                } catch (SecurityException ok) {
320 >                    // Also pass if not allowed to change setting
321                  }
322 <            };
322 >                done.countDown();
323 >            }};
324          ExecutorService e = Executors.newSingleThreadExecutor(Executors.defaultThreadFactory());
325 <        
325 >
326          e.execute(r);
327 <        e.shutdown();
327 >        await(done);
328 >
329          try {
330 <            Thread.sleep(SHORT_DELAY_MS);
331 <        } catch (Exception eX) {
248 <            unexpectedException();
249 <        } finally {
250 <            joinPool(e);
330 >            e.shutdown();
331 >        } catch (SecurityException ok) {
332          }
333 +
334 +        joinPool(e);
335      }
336  
337      /**
# Line 256 | Line 339 | public class ExecutorsTest extends JSR16
339       * specified group, priority, daemon status, name,
340       * access control context and context class loader
341       */
342 <    public void testPrivilegedThreadFactory() {
343 <        Policy savedPolicy = Policy.getPolicy();
344 <        AdjustablePolicy policy = new AdjustablePolicy();
345 <        policy.addPermission(new RuntimePermission("getContextClassLoader"));
346 <        policy.addPermission(new RuntimePermission("setContextClassLoader"));
347 <        Policy.setPolicy(policy);
348 <        final ThreadGroup egroup = Thread.currentThread().getThreadGroup();
349 <        final ClassLoader thisccl = Thread.currentThread().getContextClassLoader();
350 <        final AccessControlContext thisacc = AccessController.getContext();
351 <        Runnable r = new Runnable() {
352 <                public void run() {
353 <                    Thread current = Thread.currentThread();
354 <                    threadAssertTrue(!current.isDaemon());
355 <                    threadAssertTrue(current.getPriority() == Thread.NORM_PRIORITY);
356 <                    ThreadGroup g = current.getThreadGroup();
357 <                    SecurityManager s = System.getSecurityManager();
358 <                    if (s != null)
359 <                        threadAssertTrue(g == s.getThreadGroup());
360 <                    else
361 <                        threadAssertTrue(g == egroup);
362 <                    String name = current.getName();
363 <                    threadAssertTrue(name.endsWith("thread-1"));
364 <                    threadAssertTrue(thisccl == current.getContextClassLoader());
365 <                    threadAssertTrue(thisacc.equals(AccessController.getContext()));
366 <                }
367 <            };
368 <        ExecutorService e = Executors.newSingleThreadExecutor(Executors.privilegedThreadFactory());
369 <        
370 <        Policy.setPolicy(savedPolicy);
371 <        e.execute(r);
372 <        e.shutdown();
373 <        try {
374 <            Thread.sleep(SHORT_DELAY_MS);
375 <        } catch (Exception ex) {
376 <            unexpectedException();
377 <        } finally {
378 <            joinPool(e);
342 >    public void testPrivilegedThreadFactory() throws Exception {
343 >        final CountDownLatch done = new CountDownLatch(1);
344 >        Runnable r = new CheckedRunnable() {
345 >            public void realRun() throws Exception {
346 >                final ThreadGroup egroup = Thread.currentThread().getThreadGroup();
347 >                final ClassLoader thisccl = Thread.currentThread().getContextClassLoader();
348 >                final AccessControlContext thisacc = AccessController.getContext();
349 >                Runnable r = new CheckedRunnable() {
350 >                    public void realRun() {
351 >                        Thread current = Thread.currentThread();
352 >                        assertTrue(!current.isDaemon());
353 >                        assertTrue(current.getPriority() <= Thread.NORM_PRIORITY);
354 >                        ThreadGroup g = current.getThreadGroup();
355 >                        SecurityManager s = System.getSecurityManager();
356 >                        if (s != null)
357 >                            assertTrue(g == s.getThreadGroup());
358 >                        else
359 >                            assertTrue(g == egroup);
360 >                        String name = current.getName();
361 >                        assertTrue(name.endsWith("thread-1"));
362 >                        assertSame(thisccl, current.getContextClassLoader());
363 >                        assertEquals(thisacc, AccessController.getContext());
364 >                        done.countDown();
365 >                    }};
366 >                ExecutorService e = Executors.newSingleThreadExecutor(Executors.privilegedThreadFactory());
367 >                e.execute(r);
368 >                await(done);
369 >                e.shutdown();
370 >                joinPool(e);
371 >            }};
372 >
373 >        runWithPermissions(r,
374 >                           new RuntimePermission("getClassLoader"),
375 >                           new RuntimePermission("setContextClassLoader"),
376 >                           new RuntimePermission("modifyThread"));
377 >    }
378 >
379 >    boolean haveCCLPermissions() {
380 >        SecurityManager sm = System.getSecurityManager();
381 >        if (sm != null) {
382 >            try {
383 >                sm.checkPermission(new RuntimePermission("setContextClassLoader"));
384 >                sm.checkPermission(new RuntimePermission("getClassLoader"));
385 >            } catch (AccessControlException e) {
386 >                return false;
387 >            }
388          }
389 +        return true;
390 +    }
391 +
392 +    void checkCCL() {
393 +        SecurityManager sm = System.getSecurityManager();
394 +        if (sm != null) {
395 +            sm.checkPermission(new RuntimePermission("setContextClassLoader"));
396 +            sm.checkPermission(new RuntimePermission("getClassLoader"));
397 +        }
398 +    }
399 +
400 +    class CheckCCL implements Callable<Object> {
401 +        public Object call() {
402 +            checkCCL();
403 +            return null;
404 +        }
405 +    }
406 +
407 +    /**
408 +     * Without class loader permissions, creating
409 +     * privilegedCallableUsingCurrentClassLoader throws ACE
410 +     */
411 +    public void testCreatePrivilegedCallableUsingCCLWithNoPrivs() {
412 +        Runnable r = new CheckedRunnable() {
413 +            public void realRun() throws Exception {
414 +                if (System.getSecurityManager() == null)
415 +                    return;
416 +                try {
417 +                    Executors.privilegedCallableUsingCurrentClassLoader(new NoOpCallable());
418 +                    shouldThrow();
419 +                } catch (AccessControlException success) {}
420 +            }};
421 +
422 +        runWithoutPermissions(r);
423 +    }
424 +
425 +    /**
426 +     * With class loader permissions, calling
427 +     * privilegedCallableUsingCurrentClassLoader does not throw ACE
428 +     */
429 +    public void testPrivilegedCallableUsingCCLWithPrivs() throws Exception {
430 +        Runnable r = new CheckedRunnable() {
431 +            public void realRun() throws Exception {
432 +                Executors.privilegedCallableUsingCurrentClassLoader
433 +                    (new NoOpCallable())
434 +                    .call();
435 +            }};
436 +
437 +        runWithPermissions(r,
438 +                           new RuntimePermission("getClassLoader"),
439 +                           new RuntimePermission("setContextClassLoader"));
440 +    }
441 +
442 +    /**
443 +     * Without permissions, calling privilegedCallable throws ACE
444 +     */
445 +    public void testPrivilegedCallableWithNoPrivs() throws Exception {
446 +        // Avoid classloader-related SecurityExceptions in swingui.TestRunner
447 +        Executors.privilegedCallable(new CheckCCL());
448 +
449 +        Runnable r = new CheckedRunnable() {
450 +            public void realRun() throws Exception {
451 +                if (System.getSecurityManager() == null)
452 +                    return;
453 +                Callable task = Executors.privilegedCallable(new CheckCCL());
454 +                try {
455 +                    task.call();
456 +                    shouldThrow();
457 +                } catch (AccessControlException success) {}
458 +            }};
459 +
460 +        runWithoutPermissions(r);
461 +
462 +        // It seems rather difficult to test that the
463 +        // AccessControlContext of the privilegedCallable is used
464 +        // instead of its caller.  Below is a failed attempt to do
465 +        // that, which does not work because the AccessController
466 +        // cannot capture the internal state of the current Policy.
467 +        // It would be much more work to differentiate based on,
468 +        // e.g. CodeSource.
469 +
470 + //         final AccessControlContext[] noprivAcc = new AccessControlContext[1];
471 + //         final Callable[] task = new Callable[1];
472 +
473 + //         runWithPermissions
474 + //             (new CheckedRunnable() {
475 + //                 public void realRun() {
476 + //                     if (System.getSecurityManager() == null)
477 + //                         return;
478 + //                     noprivAcc[0] = AccessController.getContext();
479 + //                     task[0] = Executors.privilegedCallable(new CheckCCL());
480 + //                     try {
481 + //                         AccessController.doPrivileged(new PrivilegedAction<Void>() {
482 + //                                                           public Void run() {
483 + //                                                               checkCCL();
484 + //                                                               return null;
485 + //                                                           }}, noprivAcc[0]);
486 + //                         shouldThrow();
487 + //                     } catch (AccessControlException success) {}
488 + //                 }});
489 +
490 + //         runWithPermissions
491 + //             (new CheckedRunnable() {
492 + //                 public void realRun() throws Exception {
493 + //                     if (System.getSecurityManager() == null)
494 + //                         return;
495 + //                     // Verify that we have an underprivileged ACC
496 + //                     try {
497 + //                         AccessController.doPrivileged(new PrivilegedAction<Void>() {
498 + //                                                           public Void run() {
499 + //                                                               checkCCL();
500 + //                                                               return null;
501 + //                                                           }}, noprivAcc[0]);
502 + //                         shouldThrow();
503 + //                     } catch (AccessControlException success) {}
504 +
505 + //                     try {
506 + //                         task[0].call();
507 + //                         shouldThrow();
508 + //                     } catch (AccessControlException success) {}
509 + //                 }},
510 + //              new RuntimePermission("getClassLoader"),
511 + //              new RuntimePermission("setContextClassLoader"));
512 +    }
513 +
514 +    /**
515 +     * With permissions, calling privilegedCallable succeeds
516 +     */
517 +    public void testPrivilegedCallableWithPrivs() throws Exception {
518 +        Runnable r = new CheckedRunnable() {
519 +            public void realRun() throws Exception {
520 +                Executors.privilegedCallable(new CheckCCL()).call();
521 +            }};
522 +
523 +        runWithPermissions(r,
524 +                           new RuntimePermission("getClassLoader"),
525 +                           new RuntimePermission("setContextClassLoader"));
526 +    }
527 +
528 +    /**
529 +     * callable(Runnable) returns null when called
530 +     */
531 +    public void testCallable1() throws Exception {
532 +        Callable c = Executors.callable(new NoOpRunnable());
533 +        assertNull(c.call());
534 +    }
535 +
536 +    /**
537 +     * callable(Runnable, result) returns result when called
538 +     */
539 +    public void testCallable2() throws Exception {
540 +        Callable c = Executors.callable(new NoOpRunnable(), one);
541 +        assertSame(one, c.call());
542 +    }
543 +
544 +    /**
545 +     * callable(PrivilegedAction) returns its result when called
546 +     */
547 +    public void testCallable3() throws Exception {
548 +        Callable c = Executors.callable(new PrivilegedAction() {
549 +                public Object run() { return one; }});
550 +        assertSame(one, c.call());
551 +    }
552 +
553 +    /**
554 +     * callable(PrivilegedExceptionAction) returns its result when called
555 +     */
556 +    public void testCallable4() throws Exception {
557 +        Callable c = Executors.callable(new PrivilegedExceptionAction() {
558 +                public Object run() { return one; }});
559 +        assertSame(one, c.call());
560 +    }
561 +
562 +    /**
563 +     * callable(null Runnable) throws NPE
564 +     */
565 +    public void testCallableNPE1() {
566 +        try {
567 +            Callable c = Executors.callable((Runnable) null);
568 +            shouldThrow();
569 +        } catch (NullPointerException success) {}
570 +    }
571 +
572 +    /**
573 +     * callable(null, result) throws NPE
574 +     */
575 +    public void testCallableNPE2() {
576 +        try {
577 +            Callable c = Executors.callable((Runnable) null, one);
578 +            shouldThrow();
579 +        } catch (NullPointerException success) {}
580 +    }
581  
582 +    /**
583 +     * callable(null PrivilegedAction) throws NPE
584 +     */
585 +    public void testCallableNPE3() {
586 +        try {
587 +            Callable c = Executors.callable((PrivilegedAction) null);
588 +            shouldThrow();
589 +        } catch (NullPointerException success) {}
590 +    }
591 +
592 +    /**
593 +     * callable(null PrivilegedExceptionAction) throws NPE
594 +     */
595 +    public void testCallableNPE4() {
596 +        try {
597 +            Callable c = Executors.callable((PrivilegedExceptionAction) null);
598 +            shouldThrow();
599 +        } catch (NullPointerException success) {}
600      }
601  
602   }

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines