/** * Add a permission to a collection, returning the target collection. If the permission is {@code null}, it is * not added. * * @param target the target collection (must not be {@code null}) * @param source the permission to add * @return the target collection (not {@code null}) */ public static PermissionCollection add(PermissionCollection target, Permission source) { Assert.checkNotNullParam("target", target); if (source != null) target.add(source); return target; }
defaultPolicy.add((Permission) instance.get(null));
Object readResolve() { final PermissionCollection collection = s.newPermissionCollection(); for (Permission permission : p) { collection.add(permission); } if (r) collection.setReadOnly(); return collection; } }
private void addPermissions() { SystemPermission systemPermission = new SystemPermission("engine", "usederbyinternals"); perms.add(systemPermission); }
@Override public PermissionCollection getPermissions(CodeSource codesource) { PermissionCollection perms = new MyPermissionCollection(); perms.add(new RuntimePermission("setIO")); perms.add(new RuntimePermission("setSecurityManager")); perms.add(new FilePermission("<<ALL FILES>>", "read")); return perms; } }
if (url.getProtocol().equalsIgnoreCase("file")) { file = new File(url.toURI()); readClassPathFiles.add(new FilePermission(file.getAbsolutePath(), "read"));
protected PermissionCollection getPermissions(CodeSource codeSource) { PermissionCollection perms; try { try { perms = super.getPermissions(codeSource); } catch (SecurityException e) { // We lied about our CodeSource and that makes URLClassLoader unhappy. perms = new Permissions(); } ProtectionDomain myDomain = AccessController.doPrivileged(new PrivilegedAction<ProtectionDomain>() { public ProtectionDomain run() { return getClass().getProtectionDomain(); } }); PermissionCollection myPerms = myDomain.getPermissions(); if (myPerms != null) { for (Enumeration<Permission> elements = myPerms.elements(); elements.hasMoreElements();) { perms.add(elements.nextElement()); } } } catch (Throwable e) { // We lied about our CodeSource and that makes URLClassLoader unhappy. perms = new Permissions(); } perms.setReadOnly(); return perms; }
public class MinimalPolicy extends Policy { private static PermissionCollection perms; public MinimalPolicy() { super(); if (perms == null) { perms = new MyPermissionCollection(); addPermissions(); } } @Override public PermissionCollection getPermissions(CodeSource codesource) { return perms; } private void addPermissions() { SocketPermission socketPermission = new SocketPermission("*:1024-", "connect, resolve"); PropertyPermission propertyPermission = new PropertyPermission("*", "read, write"); FilePermission filePermission = new FilePermission("<<ALL FILES>>", "read"); perms.add(socketPermission); perms.add(propertyPermission); perms.add(filePermission); } }
for (Permission permission : Collections.list(permissions.elements())) { if (!emptyPolicy.implies(PluginSecurity.class.getProtectionDomain(), permission)) { actualPermissions.add(permission);
/** * */ @Override public void add(Permission permission) { final PermissionCollection p = getPerms(); if (p != null) { p.add(permission); } else { throw new RuntimeException("NYI! Using Conditional Permissions"); } }
public void addToRole(final String roleName, final Permission permission) throws PolicyContextException { if (state != OPEN) { throw new UnsupportedOperationException("Not in an open state"); } PermissionCollection permissions = rolePermissionsMap.get(roleName); if (permissions == null) { permissions = new DelegatePermissionCollection(); rolePermissionsMap.put(roleName, permissions); } permissions.add(permission); }
public void addToExcludedPolicy(final Permission permission) throws PolicyContextException { if (state != OPEN) { throw new UnsupportedOperationException("Not in an open state"); } if (excluded == null) { excluded = new DelegatePermissionCollection(); } excluded.add(permission); }
/** {@inheritDoc} */ @Override protected PermissionCollection getPermissions(CodeSource codesource) { // apply the all permission policy to all of our classes and packages. AllPermission allPerm = new AllPermission(); PermissionCollection pc = allPerm.newPermissionCollection(); pc.add(allPerm); return pc; }
public AllowAllPolicy() { super(); perms = new AllPermissionCollection(); perms.add(new AllPermission()); }
protected PermissionCollection getPermissions(CodeSource codesource) { PermissionCollection perms = super.getPermissions(codesource); perms.add(new AllPermission()); return perms; }
public AllowAllPolicy() { super(); perms = new AllPermissionCollection(); perms.add(new AllPermission()); }
protected PermissionCollection getPermissions(CodeSource codesource) { PermissionCollection perms = super.getPermissions(codesource); perms.add(new AllPermission()); return perms; }
protected PermissionCollection createPermissions(CodeSource cs, InputOutput io) { PermissionCollection allPerms = new Permissions(); allPerms.add(new AllPermission()); allPerms.setReadOnly(); return allPerms; }