ShellWeb.java

1
/*******************************************************************************
2
 * Copyhacked (H) 2012-2020.
3
 * This program and the accompanying materials
4
 * are made available under no term at all, use it like
5
 * you want, but share and discuss about it
6
 * every time possible with every body.
7
 * 
8
 * Contributors:
9
 *      ron190 at ymail dot com - initial implementation
10
 ******************************************************************************/
11
package com.jsql.view.swing.shell;
12
13
import com.jsql.view.swing.util.MediatorHelper;
14
15
import java.net.MalformedURLException;
16
import java.net.URISyntaxException;
17
import java.util.UUID;
18
19
/**
20
 * A terminal for web shell injection.
21
 */
22
public class ShellWeb extends AbstractShell {
23
    
24
    /**
25
     * Build a webshell instance.
26
     * @param terminalID Unique identifier to discriminate beyond multiple opened terminals
27
     * @param urlShell URL of current shell
28
     * @throws MalformedURLException
29
     */
30
    public ShellWeb(UUID terminalID, String urlShell) throws MalformedURLException, URISyntaxException {
31
        
32
        super(terminalID, urlShell, "system");
33
        
34 1 1. <init> : removed call to com/jsql/view/swing/shell/ShellWeb::setName → NO_COVERAGE
        this.setName("webShell");
35
    }
36
37
    @Override
38
    public void action(String command, UUID terminalID, String urlShell, String... arg) {
39
        MediatorHelper.model().getResourceAccess().runWebShell(command, terminalID, urlShell);
40
    }
41
}

Mutations

34

1.1
Location : <init>
Killed by : none
removed call to com/jsql/view/swing/shell/ShellWeb::setName → NO_COVERAGE

Active mutators

Tests examined


Report generated by PIT 1.16.1