[jboss-remoting-commits] JBoss Remoting SVN: r3926 - remoting2/branches/2.x/src/etc.

jboss-remoting-commits at lists.jboss.org jboss-remoting-commits at lists.jboss.org
Thu Apr 10 16:21:28 EDT 2008


Author: ron.sigal at jboss.com
Date: 2008-04-10 16:21:28 -0400 (Thu, 10 Apr 2008)
New Revision: 3926

Modified:
   remoting2/branches/2.x/src/etc/remoting.security.policy.core
Log:
JBREM-920, JBREM-934: (1) Added permissions for CoyoteInvoker; (2) commented PropertyPermissions; (3) replaced ${build.home} with ${remoting.jar.dir} and ${log4j.config.jar).

Modified: remoting2/branches/2.x/src/etc/remoting.security.policy.core
===================================================================
--- remoting2/branches/2.x/src/etc/remoting.security.policy.core	2008-04-10 20:17:37 UTC (rev 3925)
+++ remoting2/branches/2.x/src/etc/remoting.security.policy.core	2008-04-10 20:21:28 UTC (rev 3926)
@@ -46,17 +46,12 @@
 //****************************************************************************************************************************************************************
 
  
-grant codeBase "file:${build.home}/output/lib/jboss-remoting.jar"
+grant codeBase "file:${remoting.jar.dir}/jboss-remoting.jar"
 {
 
 /////////////////////////////////////////////////////////////////////////////////////////////
 // File permissions
 
-//    permission java.io.FilePermission "${build.home}", "read";
-//    permission java.io.FilePermission "${build.home}/jboss.identity", "read";
-//    permission java.io.FilePermission "${build.home}", "read";
-//    permission java.io.FilePermission "-", "read";
-
     // Used by org.jboss.remotinng.callback.CallbackStore.
     // This permission might need to be changed, depending on where the CallbackStore
     // is configured to exist, according to system property "jboss.server.data.dir".
@@ -82,13 +77,17 @@
     permission java.lang.RuntimePermission "getClassLoader";
 
     // Used by:
-    //     org.jboss.remoting.security.SSLSocketBuilder
-    //     org.jboss.remoting.transport.coyote.CoyoteInvoker
-    //     org.jboss.remoting.transport.http.HTTPClientInvoker
-    //     org.jboss.remoting.transport.servlet.web.ServerInvokerServlet
-    //     org.jboss.remoting.transporter.TransporterHandler
-    //     org.jboss.remoting.InvokerRegistry 
+    //   org.jboss.remoting.security.SSLSocketBuilder
+    //   org.jboss.remoting.transport.coyote.CoyoteInvoker
+    //   org.jboss.remoting.transport.http.HTTPClientInvoker
+    //   org.jboss.remoting.transport.servlet.web.ServerInvokerServlet
+    //   org.jboss.remoting.transporter.TransporterHandler
+    //   org.jboss.remoting.InvokerRegistry 
     permission java.lang.RuntimePermission "accessClassInPackage.*";
+    
+    // Used by org.jboss.remoting.transport.coyote.CoyoteInvoker
+    permission java.lang.RuntimePermission "loadLibrary.tcnative-1";
+    permission java.lang.RuntimePermission "loadLibrary.libtcnative-1";
 
 
 /////////////////////////////////////////////////////////////////////////////////////////////
@@ -100,11 +99,11 @@
     permission javax.management.MBeanPermission "*#SSLSocketBuilder[*:*]", "getAttribute";
     permission javax.management.MBeanPermission "*#-[*:*]", "isInstanceOf";    
         
-    // Used by org.jboss.remoting.detection.AbstractDetector   // necessary for proxy ?
+    // Used by org.jboss.remoting.detection.AbstractDetector
     permission javax.management.MBeanPermission "*#addServer[remoting:type=NetworkRegistry]", "invoke";
     permission javax.management.MBeanPermission "*#updateServer[remoting:type=NetworkRegistry]", "invoke";
     permission javax.management.MBeanPermission "*#removeServer[remoting:type=NetworkRegistry]", "invoke";
-    permission javax.management.MBeanPermission "*#Servers[*:*]", "getAttribute"; // needed
+    permission javax.management.MBeanPermission "*#Servers[*:*]", "getAttribute";
 
     // Used by org.jboss.remoting.detection.util.DetectorUtil
     permission javax.management.MBeanServerPermission "createMBeanServer";
@@ -123,7 +122,7 @@
     permission javax.management.MBeanPermission "org.jboss.remoting.network.NetworkRegistry#-[*:*]", "isInstanceOf";
 
     // Used by org.jboss.remoting.security.CustomSSLServerSocketFactory // necessary ??
-    permission javax.management.MBeanPermission "org.jboss.remoting.security.CustomSSLServerSocketFactory#*[*:*]", "invoke";
+//    permission javax.management.MBeanPermission "org.jboss.remoting.security.CustomSSLServerSocketFactory#*[*:*]", "invoke";
     
     // Used by org.jboss.remoting.security.ServerSocketFactoryWrapper
     permission javax.management.MBeanPermission "*#createServerSocket[*:*]", "invoke";
@@ -150,39 +149,72 @@
 /////////////////////////////////////////////////////////////////////////////////////////////
 // System properties accessed by Remoting
 
-    permission java.util.PropertyPermission "SERIALIZATION", "read";
+    // Used by org.jboss.remoting.callback.CallbackStore,
+    //         org.jboss.remoting.callback.ServerInvokerCallbackHandler
     permission java.util.PropertyPermission "file.separator", "read";
-    permission java.util.PropertyPermission "http.basic.password", "read";
-    permission java.util.PropertyPermission "http.basic.username", "read";
-    permission java.util.PropertyPermission "javax.net.ssl.keyStore", "read";
-    permission java.util.PropertyPermission "javax.net.ssl.keyStorePassword", "read";
-    permission java.util.PropertyPermission "javax.net.ssl.keyStoreType", "read";
-    permission java.util.PropertyPermission "javax.net.ssl.trustStore", "read";
-    permission java.util.PropertyPermission "javax.net.ssl.trustStorePassword", "read";
-    permission java.util.PropertyPermission "javax.net.ssl.trustStoreType", "read";
-    permission java.util.PropertyPermission "jboss.bind.address", "read";
+    permission java.util.PropertyPermission "jboss.server.data.dir", "read";
+    
+    // Used by org.jboss.remoting.detection.util.DetectorUtil,
     permission java.util.PropertyPermission "jboss.identity", "read, write";
+        
+    // Used by org.jboss.remoting.ident.Identity
+    permission java.util.PropertyPermission "jboss.identity", "read, write";
     permission java.util.PropertyPermission "jboss.identity.dir", "read";
     permission java.util.PropertyPermission "jboss.identity.domain", "read";
+        
+    // Used by org.jboss.remoting.InvokerLocator
+    permission java.util.PropertyPermission "jboss.bind.address", "read";
+    permission java.util.PropertyPermission "legacyParsing", "read";
+    permission java.util.PropertyPermission "remoting.bind_by_host", "read";
+        
+    // Used by org.jboss.remoting.loading.CompressedClassBytes
     permission java.util.PropertyPermission "jboss.remoting.compression.debug", "read";   
-    permission java.util.PropertyPermission "jboss.remoting.compression.min", "read";   
+    permission java.util.PropertyPermission "jboss.remoting.compression.min", "read"; 
+          
+    // Used by org.jboss.remoting.network.NetworkRegistry
     permission java.util.PropertyPermission "jboss.remoting.domain", "write";
     permission java.util.PropertyPermission "jboss.remoting.instanceid", "write";
     permission java.util.PropertyPermission "jboss.remoting.jmxid", "write";
-    permission java.util.PropertyPermission "jboss.remoting.pre_2_0_compatible", "read";
-    permission java.util.PropertyPermission "jboss.remoting.version", "read, write";
-    permission java.util.PropertyPermission "jboss.server.data.dir", "read";
-    permission java.util.PropertyPermission "legacyParsing", "read";
-    permission java.util.PropertyPermission "org.apache.tomcat.util.*", "read";
+        
+    // Used by org.jboss.remoting.security.SSLSocketBuilder
+    permission java.util.PropertyPermission "javax.net.ssl.keyStore", "read";
+    permission java.util.PropertyPermission "javax.net.ssl.keyStorePassword", "read";
+    permission java.util.PropertyPermission "javax.net.ssl.keyStoreType", "read";
+    permission java.util.PropertyPermission "javax.net.ssl.trustStore", "read";
+    permission java.util.PropertyPermission "javax.net.ssl.trustStorePassword", "read";
+    permission java.util.PropertyPermission "javax.net.ssl.trustStoreType", "read";
     permission java.util.PropertyPermission "org.jboss.remoting.defaultSocketFactory", "read";
-    permission java.util.PropertyPermission "org.jboss.security.ignoreHttpsHost" , "read";
+    
+    // Used by org.jboss.remoting.serialization.SerializationStreamFactory
+    permission java.util.PropertyPermission "SERIALIZATION", "read";
+                
+    // Used by org.jboss.remoting.ServerInvoker
     permission java.util.PropertyPermission "remoting.bind_by_host", "read";
+    
+    // Used by org.jboss.remoting.stream.StreamServer
     permission java.util.PropertyPermission "remoting.stream.host", "read";   
     permission java.util.PropertyPermission "remoting.stream.port", "read"; 
-    permission java.util.PropertyPermission "remoting.stream.transport", "read";   
+    permission java.util.PropertyPermission "remoting.stream.transport", "read"; 
+    
+    // Used by Used by org.jboss.remoting.transport.coyote.CoyoteInvoker
+    permission java.util.PropertyPermission "java.library.path", "read";
+    
+    // Used by org.jboss.remoting.transport.http.HTTPClientInvoker
+    permission java.util.PropertyPermission "http.basic.password", "read";
+    permission java.util.PropertyPermission "http.basic.username", "read";
+    
+    // Used by org.jboss.remoting.transport.http.ssl.HTTPSClientInvoker
+    permission java.util.PropertyPermission "org.jboss.security.ignoreHttpsHost" , "read";
+
+    // Used by org.jboss.remoting.Version
+    permission java.util.PropertyPermission "jboss.remoting.pre_2_0_compatible", "read";
+    permission java.util.PropertyPermission "jboss.remoting.version", "read, write";
+    
+    // ????
+    permission java.util.PropertyPermission "org.apache.tomcat.util.*", "read";
     permission java.util.PropertyPermission "tomcat.util.buf.StringCache.*", "read";
 
-
+ 
 /////////////////////////////////////////////////////////////////////////////////////////////
 // Permissions used by JBossSerialization.
 // [TODO - JBoss Serialization SHOULD be doing these operations in a privileged block - JBSER-105]
@@ -201,23 +233,29 @@
 // Permissions used by Logging
 // [TODO - We should use a version of JBoss logging + log4j that does this stuff in privileged blocks]
 
-      permission java.io.FilePermission "${build.home}${/}src${/}etc${/}log4j.properties", "read";
-      permission java.io.FilePermission "${build.home}${/}src${/}etc${/}log4j.xml", "read";
-      permission java.io.FilePermission "${build.home}${/}lib${/}apache-log4j${/}lib${/}log4j.jar", "read";
-      permission java.io.FilePermission "${build.home}${/}output${/}classes${/}-", "read";
-      permission java.lang.RuntimePermission "accessClassInPackage.*";
-      permission java.util.PropertyPermission "org.jboss.logging.Logger.pluginClass", "read";
-      permission java.util.PropertyPermission "log4j.defaultInitOverride", "read";
-      permission java.util.PropertyPermission "elementAttributeLimit", "read";
-      permission java.util.PropertyPermission "maxOccurLimit", "read";
-      permission java.util.PropertyPermission "entityExpansionLimit", "read";
-      permission java.util.PropertyPermission "javax.xml.parsers.DocumentBuilderFactory", "read";
-      permission java.util.PropertyPermission "log4j.ignoreTCL", "read";
-      permission java.util.PropertyPermission "log4j.configuratorClass", "read";
-      permission java.util.PropertyPermission "log4j.configDebug", "read";
-      permission java.util.PropertyPermission "log4j.debug", "read";
-      permission java.util.PropertyPermission "log4j.configuration", "read";
-      permission java.util.PropertyPermission "org.apache.commons.logging.LogFactory", "read";
-      permission java.util.PropertyPermission "org.apache.commons.logging.Log", "read";
+//    permission java.io.FilePermission "${build.home}${/}src${/}etc${/}log4j.properties", "read";
+//    permission java.io.FilePermission "${build.home}${/}src${/}etc${/}log4j.xml", "read";
+//    permission java.io.FilePermission "${build.home}${/}lib${/}apache-log4j${/}lib${/}log4j.jar", "read";
+//    permission java.io.FilePermission "file:${build.home}/output/lib/jboss-remoting.jar", "read";
+
+    permission java.io.FilePermission "${remoting.jar.dir}${/}jboss-remoting.jar", "read";
+    permission java.io.FilePermission "${log4j.jar.dir}${/}log4j.jar", "read";
+    permission java.io.FilePermission "${log4j.config.dir}${/}log4j.properties", "read";
+    permission java.io.FilePermission "${log4j.config.dir}${/}log4j.xml", "read";
+//    permission java.io.FilePermission "${build.home}${/}output${/}classes${/}-", "read";
+    
+    permission java.util.PropertyPermission "org.jboss.logging.Logger.pluginClass", "read";
+    permission java.util.PropertyPermission "log4j.defaultInitOverride", "read";
+    permission java.util.PropertyPermission "elementAttributeLimit", "read";
+    permission java.util.PropertyPermission "maxOccurLimit", "read";
+    permission java.util.PropertyPermission "entityExpansionLimit", "read";
+    permission java.util.PropertyPermission "javax.xml.parsers.DocumentBuilderFactory", "read";
+    permission java.util.PropertyPermission "log4j.ignoreTCL", "read";
+    permission java.util.PropertyPermission "log4j.configuratorClass", "read";
+    permission java.util.PropertyPermission "log4j.configDebug", "read";
+    permission java.util.PropertyPermission "log4j.debug", "read";
+    permission java.util.PropertyPermission "log4j.configuration", "read";
+    permission java.util.PropertyPermission "org.apache.commons.logging.*", "read";
+//    permission java.util.PropertyPermission "org.apache.commons.logging.Log", "read";
 };
 




More information about the jboss-remoting-commits mailing list