1 <html>
   2 <body>
   3 
   4 <applet width=100 height=100 code=i18n.class>
   5 </applet>
   6 
   7 This is a multi-stage test.  Click on "done" when you have completed
   8 reading these instructions.<br>
   9 <p>
  10 First, policytool will be invoked.  During the entire test,
  11 make sure that all the buttons, menu options, error messages,
  12 and output messages are comprehensible
  13 (you can read all the english text fine).
  14 If at any time an exception is thrown, or if any message
  15 is incomprehensible, then the test failed.  Otherwise,
  16 the test passed.
  17 <p>
  18 Press "Pass" if ... press "Fail" otherwise.
  19 <p>
  20 <ol start="0">
  21 <li> If testing on Windows, create a temporary directory. (Example: C:\foo\tmp)
  22 <li> Pull down the 'File' and 'KeyStore' menus and check values
  23 <li> Pull down 'File' menu and select 'View Warning Log'.  Confirm FileNotFound.
  24 <li> Pull down 'File' menu and select 'New'.
  25 <li> Pull down 'File' menu and select 'View Warning Log'.  Confirm empty.
  26 <li> Click on 'Add Policy Entry' and check pop-up window
  27 <li> Click on 'Edit Permission' and 'Remove Permission' and check error messages
  28 <li> Click on 'Add Permission' and check pop-up window
  29 <li> Pull down 'Permission' menu and check values
  30 <li> Select 'AWTPermission', pull down 'Target Name' and check values
  31 <li> Select 'FilePermission', pull down 'Target Name' and 'Actions' and check values.
  32 <li> Select 'NetPermission', pull down 'Target Name' and check values
  33 <li> Select 'PropertyPermission', pull down 'Actions' and check values
  34 <li> Select 'ReflectPermission', pull down 'Target Name' and check values
  35 <li> Select 'RuntimePermission', pull down 'Target Name' and check values
  36 <li> Select 'SecurityPermission', pull down 'Target Name' and check values
  37 <li> Select 'SerializablePermission', pull down 'Target Name' and check values
  38 <li> Select 'SocketPermission', pull down 'Actions' and check values
  39 <li> Type "www.example.com" for SocketPermission 'TargetName',
  40         and "connect" for 'Actions'
  41 <li> Click OK
  42 <li> Check new entry
  43 <li> Click once on new entry
  44 <li> Click on 'Edit Permission' and confirm values
  45 <li> Select AudioPermission.  Confirm 'Target Name' and 'Actions' cleared.
  46 <li> Select "play" from Target menu.
  47 <li> Click OK, confirm changed permission.
  48 <li> Type "hello" for 'CodeBase', click on 'Done', and check error message
  49 <li> Type "hello" for 'SignedBy', click on 'Done', and check warning message
  50 <li> Click, on 'Edit Policy Entry' and 'Remove Policy Entry'
  51         and check error messages
  52 <li> Select policy entry, click on 'Edit Policy Entry', and check pop-up window
  53 <li> Select policy entry, click on 'Remove Policy Entry',
  54         and check pop-up window
  55 <li> Do not remove the entry, click 'Cancel'.
  56 <li> Pull down 'File' menu and select 'Exit'.  Confirm Save option.
  57         Click 'Cancel'.
  58 <li> Select 'File' menu value 'Save' and enter "/tmp/policy1" as the filename.<br>
  59      If testing on Windows, use the temporary directory created in Step 0.
  60         (Example: Save as "C:\foo\tmp\policy1")<br>
  61      Check status message.
  62 <li> Select 'File' menu value 'New'
  63 <li> Click 'Add Policy Entry', type in "hello" for 'SignedBy' field,
  64         click 'Done'.  Confirm warning.
  65 <li> Select 'File' menu value 'Open' and confirm save option
  66         (do not save changes)
  67 <li> Type "/tmp/policy1" (if Windows, "C:\foo\tmp\policy1") for the filename
  68         and confirm warning message<br>
  69 <li> Pull down 'File' menu, select 'View Warning Log'
  70         and confirm KeyStore alias warning
  71 <li> Pull down 'KeyStore' menu and select 'Edit'
  72 <li> Enter 'foo' as KeyStore URL and check error
  73 <li> Using keytool create JKS keystore
  74 <li> Enter KeyStore URL but leave other fields empty.  Should succeed.
  75 <li> Pull down 'KeyStore' menu and select 'Edit'
  76 <li> Confirm URL and Type values.
  77 <li> Enter 'foo' as the provider and check error message.
  78 <li> Enter 'SUN' as the provider.  Should succeed.
  79 <li> Pull down 'KeyStore' menu and select 'Edit'
  80 <li> Confirm URL, Type, and Provider values.
  81 <li> Enter 'foo' as the password URL and check error message.
  82 <li> Enter URL with bad password and check error message.
  83 <li> Enter URL with good password.  Should succeed.
  84 <li> Pull down 'KeyStore' menu and select 'Edit'
  85 <li> Confirm URL, Type, Provider, and Password URL values.
  86 <li> Click OK
  87 <li> Pull down 'File' menu and select 'Save As'.  Enter "/tmp/policy2"
  88         (if Windows, "C:\foo\tmp\policy2").
  89         Confirm status message.<br>
  90 <li> Pull down 'File' menu and select 'New'.
  91 <li> Pull down 'File' menu and select 'Open'.  Enter "/tmp/policy2"
  92         (if Windows, "C:\foo\tmp\policy2").
  93         Confirm warning message.<br>
  94 <li> Click on 'Add Policy Entry', enter Codebase 'http://foo',
  95         SignedBy 'bar'.  Click on 'Done' and confirm alias warning.
  96 <li> Double-Click on just created policy entry, confirm edit window appears.
  97 <li> Change SignedBy to an alias in previously created keystore.
  98 <li> Click on Done and confirm it worked with no warning.
  99 <li> Double-Click on "SignedBy hello" policy entry and
 100         confirm edit window appears.
 101 <li> Click on Edit/Remove Principal, confirm errors.
 102 <li> Click on 'Add Principal' and check new window.
 103 <li> Click on 'OK' and confirm error message (no principal name)
 104 <li> Enter valid KeyStore alias as principal name, click OK and
 105         confirm status message.
 106 <li> Confirm new principal in Principals list.
 107 <li> Click on 'Done' (creating policy entry), confirm alias warning.
 108 <li> View warning log and confirm X500Principal/KeyStore alias message.
 109 <li> Confirm principal added to policy entry in main window listing.
 110 <li> Double click on that entry.
 111 <li> Enter codebase "file:/foobar".
 112 <li> Click on 'Add Principal'.  Select KerberosPrincipal.  enter 'foo' as name.
 113         Click OK.
 114 <li> Confirm new principal in list.
 115 <li> Double-click on new principal.  Select X500Principal.
 116         Confirm name cleared.  Type 'foo' as name.  Click OK.  Confirm error.
 117         type 'cn=foo' as name.  Click OK.  should succeed.
 118 <li> Confirm changed principal in list.
 119 <li> Click on 'Add Permission', and add any FilePermission.
 120 <li> Click on 'Done' in Policy Entry window.  Confirm alias warning.
 121 <li> Confirm entries in main window listing.
 122 <li> Select 'File' menu value 'Exit'
 123 <li> Save Changes, confirm status message.
 124 <li> If testing on Windows, delete the temporary directory and its contents
 125         created during this test.
 126 </ol>
 127 <p>
 128 
 129 </body>
 130 </html>