|
24 | 24 |
|
25 | 25 | package org.jenkinsci.plugins.scriptsecurity.sandbox.groovy;
|
26 | 26 |
|
27 |
| -import static org.junit.Assert.assertEquals; |
28 |
| -import static org.junit.Assert.assertFalse; |
29 |
| -import static org.junit.Assert.assertNotNull; |
30 |
| -import static org.junit.Assert.assertTrue; |
31 | 27 | import groovy.json.JsonBuilder;
|
32 | 28 | import groovy.json.JsonDelegate;
|
33 | 29 | import groovy.lang.GString;
|
|
37 | 33 | import groovy.lang.GroovyShell;
|
38 | 34 | import groovy.lang.GroovySystem;
|
39 | 35 | import groovy.lang.MetaMethod;
|
| 36 | +import groovy.lang.MissingMethodException; |
40 | 37 | import groovy.lang.MissingPropertyException;
|
41 | 38 | import groovy.lang.Script;
|
42 | 39 | import groovy.text.SimpleTemplateEngine;
|
|
47 | 44 | import java.lang.reflect.Method;
|
48 | 45 | import java.net.URL;
|
49 | 46 | import java.text.DateFormat;
|
| 47 | +import java.util.ArrayList; |
50 | 48 | import java.util.Arrays;
|
51 | 49 | import java.util.Collections;
|
52 | 50 | import java.util.Date;
|
|
73 | 71 | import org.junit.Test;
|
74 | 72 | import org.jvnet.hudson.test.Issue;
|
75 | 73 |
|
| 74 | +import static org.hamcrest.CoreMatchers.*; |
| 75 | +import static org.junit.Assert.*; |
| 76 | + |
76 | 77 | public class SandboxInterceptorTest {
|
77 | 78 |
|
78 | 79 | @Test public void genericWhitelist() throws Exception {
|
@@ -709,4 +710,29 @@ public static void assertRejected(Whitelist whitelist, String expectedSignature,
|
709 | 710 | }
|
710 | 711 | }
|
711 | 712 |
|
| 713 | + @Issue("JENKINS-37129") |
| 714 | + @Test public void methodMissingException() throws Exception { |
| 715 | + // the case where the unsafe receiver type causes the security check to fail |
| 716 | + try { |
| 717 | + assertEvaluate(new GenericWhitelist(), "should fail", "[].noSuchMethod()"); |
| 718 | + } catch (MissingMethodException e) { |
| 719 | + assertEquals(e.getType(),ArrayList.class); |
| 720 | + assertThat(e.getMethod(),is("noSuchMethod")); |
| 721 | + } |
| 722 | + |
| 723 | + // trying to call an existing method that's not safe |
| 724 | + try { |
| 725 | + assertEvaluate(new GenericWhitelist(), "should fail", "[].class.classLoader"); |
| 726 | + } catch (RejectedAccessException e) { |
| 727 | + assertEquals("method java.lang.Class getClassLoader", e.getSignature()); |
| 728 | + } |
| 729 | + |
| 730 | + // the case where the safe receiver type causes the security check to pass |
| 731 | + try { |
| 732 | + assertEvaluate(new GenericWhitelist(), "should fail", "1.noSuchMethod()"); |
| 733 | + } catch (MissingMethodException e) { |
| 734 | + assertEquals(e.getType(),Integer.class); |
| 735 | + assertThat(e.getMethod(),is("noSuchMethod")); |
| 736 | + } |
| 737 | + } |
712 | 738 | }
|
0 commit comments