1 /*
   2  * Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.
   8  *
   9  * This code is distributed in the hope that it will be useful, but WITHOUT
  10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  12  * version 2 for more details (a copy is included in the LICENSE file that
  13  * accompanied this code).
  14  *
  15  * You should have received a copy of the GNU General Public License version
  16  * 2 along with this work; if not, write to the Free Software Foundation,
  17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  18  *
  19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  20  * or visit www.oracle.com if you need additional information or have any
  21  * questions.
  22  */
  23 
  24 /*
  25  * @test
  26  * @bug 8047305 8075618
  27  * @summary Tests jarsigner tool and JarSigner API work with multi-release JAR files.
  28  * @library /test/lib
  29  * @library /lib/testlibrary
  30  * @run main MVJarSigningTest
  31  */
  32 
  33 import jdk.security.jarsigner.JarSigner;
  34 
  35 import java.io.BufferedReader;
  36 import java.io.File;
  37 import java.io.FileInputStream;
  38 import java.io.FileOutputStream;
  39 import java.io.IOException;
  40 import java.io.InputStreamReader;
  41 import java.nio.file.Files;
  42 import java.nio.file.Path;
  43 import java.nio.file.Paths;
  44 import java.security.KeyStore;
  45 import java.security.PrivateKey;
  46 import java.security.cert.Certificate;
  47 import java.security.cert.CertificateFactory;
  48 import java.util.ArrayList;
  49 import java.util.Arrays;
  50 import java.util.Collections;
  51 import java.util.List;
  52 import java.util.concurrent.TimeUnit;
  53 import java.util.jar.JarFile;
  54 import java.util.stream.Stream;
  55 import java.util.zip.ZipEntry;
  56 import java.util.zip.ZipFile;
  57 import java.util.zip.ZipOutputStream;
  58 
  59 import jdk.test.lib.JDKToolFinder;
  60 import jdk.test.lib.JDKToolLauncher;
  61 import jdk.test.lib.Utils;
  62 import jdk.test.lib.process.OutputAnalyzer;
  63 import jdk.test.lib.process.ProcessTools;
  64 
  65 
  66 public class MVJarSigningTest {
  67 
  68     private static final String TEST_SRC = System.getProperty("test.src", ".");
  69     private static final String USR_DIR = System.getProperty("user.dir", ".");
  70     private static final String JAR_NAME = "MV.jar";
  71     private static final String KEYSTORE = "keystore.jks";
  72     private static final String ALIAS = "JavaTest";
  73     private static final String STOREPASS = "changeit";
  74     private static final String KEYPASS = "changeit";
  75     private static final String SIGNED_JAR = "Signed.jar";
  76     private static final String POLICY_FILE = "SignedJar.policy";
  77     private static final String VERSION_MESSAGE = "I am running on version 9";
  78 
  79     public static void main(String[] args) throws Throwable {
  80         // compile java files in jarContent directory
  81         compile("jarContent");
  82 
  83         // create multi-release jar
  84         Path classes = Paths.get("classes");
  85         jar("cf", JAR_NAME, "-C", classes.resolve("base").toString(), ".",
  86                 "--release", "9", "-C", classes.resolve("v9").toString(), ".",
  87                 "--release", "10", "-C", classes.resolve("v10").toString(), ".")
  88             .shouldHaveExitValue(0);
  89 
  90         genKey();
  91         signJar(JAR_NAME)
  92             .shouldHaveExitValue(0)
  93             .shouldMatch("signing.*META-INF/versions/9/version/Version.class")
  94             .shouldMatch("signing.*META-INF/versions/10/version/Version.class")
  95             .shouldMatch("signing.*version/Main.class")
  96             .shouldMatch("signing.*version/Version.class");
  97         verify(SIGNED_JAR);
  98 
  99         // test with JarSigner API
 100         Files.deleteIfExists(Paths.get(SIGNED_JAR));
 101         signWithJarSignerAPI(JAR_NAME);
 102         verify(SIGNED_JAR);
 103 
 104         // test Permission granted
 105         File keypass = new File("keypass");
 106         try (FileOutputStream fos = new FileOutputStream(keypass)) {
 107             fos.write(KEYPASS.getBytes());
 108         }
 109         String[] cmd = {
 110                 "-classpath", SIGNED_JAR,
 111                 "-Djava.security.manager",
 112                 "-Djava.security.policy=" +
 113                 TEST_SRC + File.separator + POLICY_FILE,
 114                 "version.Main"};
 115         ProcessTools.executeTestJvm(cmd)
 116             .shouldHaveExitValue(0)
 117             .shouldContain(VERSION_MESSAGE);
 118     }
 119 
 120     private static void compile (String jarContent_path) throws Throwable {
 121         Path classes = Paths.get(USR_DIR, "classes", "base");
 122         Path source = Paths.get(TEST_SRC, jarContent_path, "base", "version");
 123         CompilerUtils.compile(source, classes);
 124 
 125         classes = Paths.get(USR_DIR, "classes", "v9");
 126         source = Paths.get(TEST_SRC, jarContent_path , "v9", "version");
 127         CompilerUtils.compile(source, classes);
 128 
 129         classes = Paths.get(USR_DIR, "classes", "v10");
 130         source = Paths.get(TEST_SRC, jarContent_path, "v10", "version");
 131         CompilerUtils.compile(source, classes);
 132     }
 133 
 134     private static OutputAnalyzer jar(String...args) throws Throwable {
 135         JDKToolLauncher launcher = JDKToolLauncher.createUsingTestJDK("jar");
 136         Stream.of(args).forEach(launcher::addToolArg);
 137         return ProcessTools.executeCommand(launcher.getCommand());
 138     }
 139 
 140     private static void genKey() throws Throwable {
 141         String keytool = JDKToolFinder.getJDKTool("keytool");
 142         Files.deleteIfExists(Paths.get(KEYSTORE));
 143         ProcessTools.executeCommand(keytool,
 144                 "-J-Duser.language=en",
 145                 "-J-Duser.country=US",
 146                 "-genkey",
 147                 "-alias", ALIAS,
 148                 "-keystore", KEYSTORE,
 149                 "-keypass", KEYPASS,
 150                 "-dname", "cn=sample",
 151                 "-storepass", STOREPASS
 152         ).shouldHaveExitValue(0);
 153     }
 154 
 155     private static OutputAnalyzer signJar(String jarName) throws Throwable {
 156         List<String> args = new ArrayList<>();
 157         args.add("-verbose");
 158         args.add("-signedjar");
 159         args.add(SIGNED_JAR);
 160         args.add(jarName);
 161         args.add(ALIAS);
 162 
 163         return jarsigner(args);
 164     }
 165 
 166     private static void verify(String signedJarName) throws Throwable {
 167         verifyJar(signedJarName)
 168             .shouldHaveExitValue(0)
 169             .shouldContain("jar verified")
 170             .shouldMatch("smk.*META-INF/versions/9/version/Version.class")
 171             .shouldMatch("smk.*META-INF/versions/10/version/Version.class")
 172             .shouldMatch("smk.*version/Main.class")
 173             .shouldMatch("smk.*version/Version.class");
 174     }
 175 
 176     private static OutputAnalyzer verifyJar(String signedJarName) throws Throwable {
 177         List<String> args = new ArrayList<>();
 178         args.add("-verbose");
 179         args.add("-verify");
 180         args.add(signedJarName);
 181 
 182         return jarsigner(args);
 183     }
 184 
 185     private static OutputAnalyzer jarsigner(List<String> extra)
 186             throws Throwable {
 187         JDKToolLauncher launcher = JDKToolLauncher.createUsingTestJDK("jarsigner")
 188                 .addVMArg("-Duser.language=en")
 189                 .addVMArg("-Duser.country=US")
 190                 .addToolArg("-keystore")
 191                 .addToolArg(KEYSTORE)
 192                 .addToolArg("-storepass")
 193                 .addToolArg(STOREPASS)
 194                 .addToolArg("-keypass")
 195                 .addToolArg(KEYPASS);
 196         for (String s : extra) {
 197             if (s.startsWith("-J")) {
 198                 launcher.addVMArg(s.substring(2));
 199             } else {
 200                 launcher.addToolArg(s);
 201             }
 202         }
 203         return ProcessTools.executeCommand(launcher.getCommand());
 204     }
 205 
 206     private static void signWithJarSignerAPI(String jarName)
 207             throws Throwable {
 208         // Get JarSigner
 209         try (FileInputStream fis = new FileInputStream(KEYSTORE)) {
 210                 KeyStore ks = KeyStore.getInstance("JKS");
 211                 ks.load(fis, STOREPASS.toCharArray());
 212                 PrivateKey pk = (PrivateKey)ks.getKey(ALIAS, KEYPASS.toCharArray());
 213                 Certificate cert = ks.getCertificate(ALIAS);
 214                 JarSigner signer = new JarSigner.Builder(pk,
 215                         CertificateFactory.getInstance("X.509").generateCertPath(
 216                                 Collections.singletonList(cert)))
 217                         .build();
 218             // Sign jar
 219             try (ZipFile src = new JarFile(jarName);
 220                     FileOutputStream out = new FileOutputStream(SIGNED_JAR)) {
 221                 signer.sign(src,out);
 222             }
 223         }
 224     }
 225 
 226 }
 227 
 228