JBoss Remoting SVN: r5905 - remoting2/branches/2.2/docs/guide/en.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2010-07-03 18:54:03 -0400 (Sat, 03 Jul 2010)
New Revision: 5905
Modified:
remoting2/branches/2.2/docs/guide/en/chap5.xml
Log:
JBREM-1219: Added discussion of "generalizeSocketException".
Modified: remoting2/branches/2.2/docs/guide/en/chap5.xml
===================================================================
--- remoting2/branches/2.2/docs/guide/en/chap5.xml 2010-07-03 22:36:38 UTC (rev 5904)
+++ remoting2/branches/2.2/docs/guide/en/chap5.xml 2010-07-03 22:54:03 UTC (rev 5905)
@@ -1105,19 +1105,28 @@
side maximum number of active socket connections. This basically equates
to the maximum number of concurrent client calls that can be made from
the socket client invoker. The default is 50.</para>
+
+ <para><emphasis role="bold">numberOfCallRetries</emphasis> - the number of
+ times a failed invocation will be retried. For example, it is possible that the
+ server side of a socket connection could time out, leaving the connection
+ invalid. In that case, the socket will be discarded and another, possibly
+ new, socket will be used. Note that after numberOfCallRetries - 2 attempts,
+ the connection pool will be flushed on the assumption that all connections
+ are invalid. After numberOfCallRetries attempts, a
+ <classname>MarshalException</classname>, whose cause is the original exception,
+ will be thrown. The default value is 3. See also the
+ "generalizeSocketException" parameter, below</para>
+
+ <para><emphasis role="bold">generalizeSocketException</emphasis> -
+ If set to false, a failed invocation will be retried in the case of
+ <classname>SocketException</classname>s.
+ If set to true, a failed invocation will be retried in the case of
+ <classname>SocketException</classname>s and also any <classname>IOException</classname>
+ whose message matches the regular expression
+ <code>^.*(?:connection.*reset|connection.*closed|broken.*pipe).*$</code>.'
+ See also the "numberOfCallRetries" parameter, above. The default value is
+ false.</para>
- <para><emphasis role="bold">numberOfCallRetries</emphasis> - number of
- retries for making invocation. It is possible that an existing socket
- connection timed out while waiting within the pool. Since not doing a
- connection check by default, will throw away the connection and try to
- get a new one. Will do this for whatever the numberOfCallRetries (which
- defaults to 3) is. However, when reaches numberOfCallsRetries - 2, will
- flush the entire connection pool under the assumption that all
- connections in the pool have timed out and are invalid and will start
- over by creating a new connection. If still fails, will throw
- MarshalException with the cause being the original
- SocketException.</para>
-
<para><emphasis role="bold">clientSocketClass</emphasis> - specifies the
fully qualified class name for the custom SocketWrapper implementation
to use on the client. Note, will need to make sure this is marked as a
14 years, 4 months
JBoss Remoting SVN: r5904 - remoting2/branches/2.x/docs/guide/en.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2010-07-03 18:36:38 -0400 (Sat, 03 Jul 2010)
New Revision: 5904
Modified:
remoting2/branches/2.x/docs/guide/en/chap5.xml
Log:
JBREM-1219: Added discussion of "generalizeSocketException".
Modified: remoting2/branches/2.x/docs/guide/en/chap5.xml
===================================================================
--- remoting2/branches/2.x/docs/guide/en/chap5.xml 2010-07-03 19:33:12 UTC (rev 5903)
+++ remoting2/branches/2.x/docs/guide/en/chap5.xml 2010-07-03 22:36:38 UTC (rev 5904)
@@ -1663,14 +1663,21 @@
to the maximum number of concurrent client calls that can be made from
the socket client invoker. The default is 50.</para>
- <para><emphasis role="bold">numberOfCallRetries</emphasis> - number of
- retries for making invocation. It is possible that a socket connection
- timed out while waiting within the pool. Since not doing a connection
- check by default, will throw away the connection and try to get a new
- one. Will do this for numberOfCallRetries times (which defaults to 3).
- If still fails, will throw an
- <classname>org.jboss.remoting.InvocationFailureException</classname>,
- with the cause being the original exception.</para>
+ <para><emphasis role="bold">numberOfCallRetries</emphasis> - the number of
+ times a failed invocation will be retried. For example, it is possible that the
+ server side of a socket connection could time out, leaving the connection
+ invalid. In that case, the socket will be discarded and another, possibly
+ new, socket will be used. The default value is 3. See also the
+ parameter generalizeSocketException, below</para>
+
+ <para><emphasis role="bold">generalizeSocketException</emphasis> -
+ If set to false, a failed invocation will be retried in the case of
+ <classname>SocketException</classname>s.
+ If set to true, a failed invocation will be retried in the case of
+ <classname>SocketException</classname>s and also any <classname>IOException</classname>
+ whose message matches the regular expression
+ <code>^.*(?:connection.*reset|connection.*closed|broken.*pipe).*$</code>.
+ The default value is false.</para>
<para><emphasis role="bold">clientSocketClass</emphasis> - specifies the
fully qualified class name for the custom SocketWrapper implementation
14 years, 4 months
JBoss Remoting SVN: r5903 - remoting2/branches/2.x/src/etc.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2010-07-03 15:33:12 -0400 (Sat, 03 Jul 2010)
New Revision: 5903
Modified:
remoting2/branches/2.x/src/etc/remoting.security.policy.tests.minimal
Log:
JBREM-1231: Trivial.
Modified: remoting2/branches/2.x/src/etc/remoting.security.policy.tests.minimal
===================================================================
--- remoting2/branches/2.x/src/etc/remoting.security.policy.tests.minimal 2010-07-03 19:23:03 UTC (rev 5902)
+++ remoting2/branches/2.x/src/etc/remoting.security.policy.tests.minimal 2010-07-03 19:33:12 UTC (rev 5903)
@@ -47,9 +47,9 @@
//******************************************************************
//**** Minimal set of permissions for tests ****
//******************************************************************
-//******************************************************************
-
-grant codeBase "file:${build.home}/output/tests/classes/-"
+//******************************************************************
+
+grant codeBase "file:${build.home}/output/tests/classes/-"
{
// Permissions to read test keystores and truststores
permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}bisocket${/}ssl${/}.keystore", "read";
@@ -67,8 +67,8 @@
permission java.util.PropertyPermission "org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH", "read";
permission java.util.PropertyPermission "jrunit.bind_addr", "read";
-
- // org.jboss.test.remoting.transport.InvokerTestDriver
+
+ // org.jboss.test.remoting.transport.InvokerTestDriver
permission java.util.PropertyPermission "remoting.metadata", "read";
permission java.util.PropertyPermission "jvm.mx", "read";
14 years, 4 months
JBoss Remoting SVN: r5902 - remoting2/branches/2.x.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2010-07-03 15:23:03 -0400 (Sat, 03 Jul 2010)
New Revision: 5902
Modified:
remoting2/branches/2.x/build.xml
Log:
JBREM-1231: Changes to run InvokerRegistrySecurityTestCase.
Modified: remoting2/branches/2.x/build.xml
===================================================================
--- remoting2/branches/2.x/build.xml 2010-07-03 19:18:14 UTC (rev 5901)
+++ remoting2/branches/2.x/build.xml 2010-07-03 19:23:03 UTC (rev 5902)
@@ -306,6 +306,15 @@
<pathelement path="${jdbc-driver-jar}"/>
</path>
+ <path id="tests.classpath.invokerregistrysecurity">
+ <pathelement path="${ant.library.dir}/ant.jar"/>
+ <pathelement path="${ant.library.dir}/ant-junit.jar"/>
+ <pathelement path="${output.lib.dir}/jboss-remoting-tests.jar"/>
+ <pathelement path="${output.lib.dir}/jboss-remoting-invokerregistry-test.jar"/>
+ <path refid="library.classpath"/>
+ <pathelement path="${jdbc-driver-jar}"/>
+ </path>
+
<path id="third_party.classpath.tomcat">
<fileset dir="${lib.dir}">
<include name="**/*.jar"/>
@@ -373,6 +382,7 @@
<property name="java.security.policy" value="${output.tests}/remoting.security.policy"/>
<property name="java.security.policy.marshal" value="${output.tests}/remoting.security.policy.marshal"/>
<property name="java.security.policy.strict" value="${output.tests}/remoting.security.policy.strict"/>
+ <property name="java.security.policy.invokerregistry" value="${output.tests}/remoting.security.policy.invokerregistry"/>
<!--<property name="java.security.manager" value="org.jboss.test.security.LoggingSecurityManager"/>-->
<!--property name="java.security.debug" value="access,failure"/-->
<property name="java.security.debug" value=""/>
@@ -397,6 +407,13 @@
files="remoting.security.policy.core,
remoting.security.policy.tests.marshal"/>
</concat>
+
+ <!-- Create security policy file for tests.functional.invokerregistry.security -->
+ <concat destfile="${output.tests}/remoting.security.policy.invokerregistry">
+ <filelist dir="${etc.dir}"
+ files="remoting.security.policy.core,
+ remoting.security.policy.tests.invokerregistry"/>
+ </concat>
</target>
<!-- ================================================================== -->
@@ -600,6 +617,7 @@
<exclude name="org/jboss/test/remoting/marshall/dynamic/remote/**/TestWrapper*"/>
<exclude name="org/jboss/test/remoting/marshall/dynamic/remote/**/TestObject*"/>
<exclude name="org/jboss/test/remoting/marshall/dynamic/remote/**/ResponseImpl*"/>
+ <exclude name="org/jboss/test/remoting/security/InvokerRegistryCaller*"/>
</fileset>
</jar>
<jar jarfile="${output.lib.dir}/jboss-remoting-loading-tests.jar"
@@ -611,7 +629,11 @@
<include name="org/jboss/test/remoting/marshall/dynamic/remote/classloaders/ResponseImpl.class"/>
</fileset>
</jar>
-
+ <jar jarfile="${output.lib.dir}/jboss-remoting-invokerregistry-test.jar" manifest="${manifest.file}">
+ <fileset dir="${tests.compile.dir}">
+ <include name="org/jboss/test/remoting/security/InvokerRegistryCaller*"/>
+ </fileset>
+ </jar>
</target>
<target name="manifest" depends="configure">
@@ -824,6 +846,9 @@
</target>
<target name="one-test" depends="tests.jars">
+ <echo>Running ${test}TestCase</echo>
+ <mkdir dir="${output.tests.results}"/>
+ <mkdir dir="${output.tests.tmp}"/>
<junit
printsummary="true" fork="yes" includeantruntime="true"
tempdir="${output.tests.tmp}" maxmemory="1024m">
@@ -1175,6 +1200,7 @@
<exclude name="**/remoting/transport/multiplex/**/**Performance*TestCase.class"/>
<exclude name="**/remoting/versioning/**/*TestCase.class"/>
<!-- <exclude name="**/remoting/transport/multiplex/**/MultiplexMultiThreadedPerformanceTestCase.class"/> -->
+ <exclude name="**/remoting/**/InvokerRegistrySecurityTestCase.class"/>
</fileset>
</batchtest>
</junit>
@@ -1241,6 +1267,7 @@
<exclude name="**/remoting/classloader/InvokerTestCase.class" if="isJDK4"/>
<exclude name="**/remoting/oneway/OnewayThreadPoolTestCase.class" if="isJDK4"/>
<exclude name="**/remoting/security/ServerSocketFactoryProxyTestCase.class" if="isJDK4"/>
+ <exclude name="**/remoting/**/InvokerRegistrySecurityTestCase.class"/>
</fileset>
</batchtest>
</junit>
@@ -1288,8 +1315,48 @@
</fileset>
</batchtest>
</junit>
+ <antcall target="tests.functional.invokerregistry.security" inheritrefs="true"/>
</target>
+ <target name="tests.functional.invokerregistry.security" depends="tests.jars">
+ <mkdir dir="${output.tests.results}"/>
+ <mkdir dir="${output.tests.tmp}"/>
+ <junit
+ printsummary="true" fork="yes" includeantruntime="true"
+ tempdir="${output.tests.tmp}" maxmemory="1024m">
+ <jvmarg value="-Dloader.path=${output.lib.dir}/jboss-remoting-loading-tests.jar"/>
+ <jvmarg value="-D${remoting.metadata.key}=${metadata}"/>
+ <classpath>
+ <path refid="tests.classpath.invokerregistrysecurity"/>
+ </classpath>
+ <sysproperty key="java.security.manager" value=""/>
+ <sysproperty key="java.security.policy" value="${java.security.policy.invokerregistry}"/>
+ <sysproperty key="java.security.debug" value="${java.security.debug}"/>
+ <sysproperty key="build.home" value="${basedir}"/>
+ <sysproperty key="remoting.jar.dir" value="${basedir}/output/lib"/>
+ <sysproperty key="log4j.jar.dir" value="${basedir}/lib/apache-log4j/lib"/>
+ <sysproperty key="log4j.config.dir" value="${basedir}/src/etc"/>
+ <sysproperty key="ant.library.dir" value="${ant.library.dir}"/>
+ <sysproperty key="jboss-junit-configuration" value="${jboss-junit-configuration}"/>
+ <sysproperty key="jrunit.bind_addr" value="${bind.address}"/>
+ <sysproperty key="jrunit.mcast_addr" value="${multicast.address}"/>
+ <sysproperty key="jrunit.mcast_port" value="${multicast.port}"/>
+ <sysproperty key="jrunit.receive_on_all_interfaces" value="${receiveOnAllInterfaces}"/>
+ <sysproperty key="jrunit.send_on_all_interfaces" value="${sendOnAllInterfaces}"/>
+ <sysproperty key="jrunit.send_interfaces" value="${sendInterfaces}"/>
+ <sysproperty key="jrunit.logdir" value="${output.tests}"/>
+ <formatter classname="org.jboss.ant.taskdefs.XMLJUnitMultipleResultFormatter"
+ extension="-${jboss-junit-configuration}.xml"/>
+ <batchtest fork="yes" todir="${output.tests.results}"
+ haltonfailure="no">
+ <fileset dir="${tests.compile.dir}">
+ <include name="**/remoting/**/InvokerRegistrySecurityTestCase.class"/>
+ </fileset>
+ </batchtest>
+ </junit>
+ </target>
+
+
<target name="tests.functional.main.isJDK5" depends="tests.jars" unless="isJDK4">
<mkdir dir="${output.tests.results}"/>
<mkdir dir="${output.tests.tmp}"/>
@@ -4699,7 +4766,7 @@
<findbugs home="${findbugs.home}" output="html" outputFile="${output.dir}/findbugs.html" >
<class location="${output.lib.dir}/jboss-remoting.jar" />
<sourcePath path="${src.dir}" />
- <auxClasspath refid="third_party.classpath"/>
+ <auxClasspath refid="third_party.classpath"/>
</findbugs>
</target>
14 years, 4 months
JBoss Remoting SVN: r5901 - remoting2/branches/2.x/src/etc.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2010-07-03 15:18:14 -0400 (Sat, 03 Jul 2010)
New Revision: 5901
Added:
remoting2/branches/2.x/src/etc/remoting.security.policy.tests.invokerregistry
Log:
JBREM-1231: New policy for InvokerRegistrySecurityTestCase.
Added: remoting2/branches/2.x/src/etc/remoting.security.policy.tests.invokerregistry
===================================================================
--- remoting2/branches/2.x/src/etc/remoting.security.policy.tests.invokerregistry (rev 0)
+++ remoting2/branches/2.x/src/etc/remoting.security.policy.tests.invokerregistry 2010-07-03 19:18:14 UTC (rev 5901)
@@ -0,0 +1,388 @@
+// JBoss, Home of Professional Open Source
+// Copyright 2005, JBoss Inc., and individual contributors as indicated
+// by the @authors tag. See the copyright.txt in the distribution for a
+// full listing of individual contributors.
+//
+// This is free software; you can redistribute it and/or modify it
+// under the terms of the GNU Lesser General Public License as
+// published by the Free Software Foundation; either version 2.1 of
+// the License, or (at your option) any later version.
+//
+// This software is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+// Lesser General Public License for more details.
+//
+// You should have received a copy of the GNU Lesser General Public
+// License along with this software; if not, write to the Free
+// Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
+// 02110-1301 USA, or see the FSF site: http://www.fsf.org.
+//
+
+//****************************************************************************************************************************************************************
+//****************************************************************************************************************************************************************
+//***************************************************************************************************
+//**** Permissions needed by Remoting to run the test suite ****
+//**** ****
+//**** This file is used by org.jboss.test.remoting.security.InvokerRegistrySecurityTestCase. ****
+//**** It is identical to remoting.security.policy.tests, except that the ****
+//**** "file:${build.home}/output/tests/classes/-" code base is replaced by the two codebases ****
+//**** "file:${build.home}/output/lib/jboss-remoting-tests.jar" and ****
+//**** "file:${build.home}/output/lib/jboss-remoting-invokerregistry-test.jar", which are ****
+//**** granted the same permissions as "file:${build.home}/output/tests/classes/-" except ****
+//**** for the lack of permission ****
+//**** ****
+//**** permission java.lang.RuntimePermission "invokerRegistryUpdate"; ****
+//**** ****
+//**** for "file:${build.home}/output/lib/jboss-remoting-invokerregistry-test.jar". ****
+//***************************************************************************************************
+//***************************************************************************************************
+
+grant codeBase "file:${build.home}/output/lib/jboss-remoting.jar"
+{
+ // Permission to read test keystores
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}-", "read";
+
+ // Permission for org.jboss.remoting.callback.CallbackStore
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}-", "read, write, delete";
+
+ // Permission for org.jboss.remoting.ConnectionNotifier
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.lease.InjectedConnectionListenerTestCase$TestConnectionListener#handleConnectionException[jboss:type=connectionlistener]", "invoke";
+
+ // org.jboss.test.remoting.detection.metadata.MetadataTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.metadata.MetadataTestCase$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "isInstanceOf";
+
+ // org.jboss.test.remoting.handler.mbean.ServerTest
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.handler.mbean.MBeanHandler#Invoker[test:type=handler]", "setAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.handler.mbean.MBeanHandler#MBeanServer[test:type=handler]", "setAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.handler.mbean.MBeanHandler#*[test:type=handler]", "invoke";
+
+ // org.jboss.test.remoting.security.CallbackErrorHandlerProxyTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestCallbackErrorHandler#*[test:type=TestCallbackErrorHandler]", "setAttribute, invoke";
+
+ // org.jboss.test.remoting.security.CallbackStoreProxyTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestCallbackStore#*[test:type=Callbackstore]", "setAttribute, invoke";
+
+ // org.jboss.test.remoting.security.NetworkRegistryProxyTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestNetworkRegistry#addServer[test:type=TestNetworkRegistry]", "invoke";
+
+ // org.jboss.test.remoting.security.ServerInvokerHandlerProxyTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestServerInvocationHandler#*[test:type=TestServerInvocationHandler]", "setAttribute, invoke";
+
+ // org.jboss.test.remoting.security.ServerSocketFactoryProxyTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestServerSocketFactory#createServerSocket[test:type=SSLServerSocketFactoryService]", "invoke";
+
+ // org.jboss.test.remoting.transport.bisocket.ssl.builder.SSLBisocketInvokerTestCase
+ // org.jboss.test.remoting.transport.http.ssl.basic.HTTPSInvokerTestCase
+ // org.jboss.test.remoting.transport.http.ssl.builder.HTTPSInvokerTestCase
+ // org.jboss.test.remoting.transport.http.ssl.custom.HTTPSInvokerTestCase
+ // org.jboss.test.remoting.transport.rmi.ssl.builder.RMIInvokerTestCase
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#createServerSocket[test:type=serversocketfactory]", "invoke";
+
+ // org.jboss.test.remoting.transport.{bisocket,http,socket}.ssl.config.FactoryConfigTestCase
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#createServerSocket[jboss:type=serversocketfactory]", "invoke";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#SSLSocketBuilder[jboss:type=serversocketfactory]", "getAttribute";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#SSLSocketBuilder[jboss:type=serversocketfactory2]", "getAttribute";
+
+ // org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase$SerializableServerSocketFactory#SSLSocketBuilder[jboss:type=serversocketfactory]", "getAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase$SerializableServerSocketFactory#SSLSocketBuilder[jboss:type=serversocketfactory2]", "getAttribute";
+
+ // org.jboss.test.remoting.transport.http.connection.socketfactory.by_mbean.SocketFactoryByMBeanTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.http.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#createServerSocket[jboss:type=serversocketfactory]", "invoke";
+
+ // org.jboss.test.remoting.transport.http.ssl.config.FactoryConfigTestCase
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#createServerSocket[jboss:type=serversocketfactory2]", "invoke";
+
+ // org.jboss.test.remoting.transport.rmi.connection.socketfactory.by_mbean.SocketFactoryByMBeanTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#createServerSocket[jboss:type=serversocketfactory]", "invoke";
+
+ // org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase$SerializableServerSocketFactory#createServerSocket[jboss:type=serversocketfactory]", "invoke";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase$SerializableServerSocketFactory#createServerSocket[jboss:type=serversocketfactory2]", "invoke";
+
+ // org.jboss.test.remoting.transport.{bisocket,rmi}.ssl.builder.SSLBisocketInvokerTestCase
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#SSLSocketBuilder[test:type=serversocketfactory]", "getAttribute";
+
+ // Subclasses of org.jboss.test.remoting.transport.config.FactoryConfigTestCaseParent and FactoryConfigTestCaseSSLParent
+ // org.jboss.test.remoting.transport.{http,socket}.connection.socketfactory.by_mbean.SocketFactoryTestServer
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.socket.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#createServerSocket[jboss:type=serversocketfactory]", "invoke";
+
+ // org.jboss.test.remoting.transport.http.proxy.ProxyAuthenticationTestCase
+ permission java.util.PropertyPermission "http.proxyHost", "write";
+ permission java.util.PropertyPermission "http.proxyPort", "write";
+ permission java.util.PropertyPermission "proxySet", "write";
+ permission java.util.PropertyPermission "http.proxy.username", "write";
+ permission java.util.PropertyPermission "http.proxy.password", "write";
+};
+
+
+//****************************************************************************************************************************************************************
+//****************************************************************************************************************************************************************
+//****************************************************************************
+//**** Permissions used by the test suite ****
+//**** (tests.functional.main, tests.functional.main.http, ****
+//**** tests.functional.main.core, and tests.functional.main.http.core) ****
+//****************************************************************************
+//****************************************************************************
+
+grant codeBase "file:${build.home}/output/lib/jboss-remoting-tests.jar"
+{
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}classloader${/}race${/}test.jar", "read";
+
+ // Used by the descendents of org.jboss.test.remoting.shutdown.ShutdownTestParent.
+ permission java.io.FilePermission "<<ALL FILES>>", "execute";
+
+ permission java.lang.reflect.ReflectPermission "suppressAccessChecks";
+
+ permission java.lang.RuntimePermission "enableContextClassLoaderOverride";
+ permission java.lang.RuntimePermission "createClassLoader";
+ permission java.lang.RuntimePermission "getClassLoader";
+ permission java.lang.RuntimePermission "setContextClassLoader";
+ permission java.lang.RuntimePermission "org.jboss.naming.NamingContext.getLocal";
+
+ permission javax.management.MBeanTrustPermission "register";
+
+ permission javax.management.MBeanPermission "org.jboss.remoting.detection.jndi.JNDIDetector#-[remoting:type=JNDIDetector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.detection.multicast.MulticastDetector#-[remoting:*]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.remoting.detection.multicast.MulticastDetector#*[test:type=MulticastDetector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.network.NetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf, addNotificationListener";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#-[jboss:type=serversocketfactory2]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#-[*:type=serversocketfactory]", "registerMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#createServerSocket[jboss:*]", "invoke";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#createServerSocket[test:type=serversocketfactory]", "invoke";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.*#-[jboss.remoting:service=invoker,*]", "unregisterMBean, registerMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[jboss.remoting:type=Connector,*]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[jboss:type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:transport=socket,type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:transport=sslsocket,type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:transport=coyote,type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:type=Connector]","registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.socket.SocketServerInvoker#Configuration[jboss.remoting:service=invoker,*]", "getAttribute";
+
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.jndi.JNDIDetectorTest1$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.jndi.JNDIDetectorTest2$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.metadata.MetadataTestCase$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf, addNotificationListener";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.handler.mbean.MBeanHandler#-[test:type=handler]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.lease.InjectedConnectionListenerTestCase$TestConnectionListener#-[jboss:type=connectionlistener]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.lease.InjectedConnectionListenerTestCase$TestConnectionListener#handleConnectionException[jboss:type=connectionlistener]", "invoke";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestCallbackErrorHandler#*[test:type=TestCallbackErrorHandler]", "registerMBean, getAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestCallbackStore#*[test:type=Callbackstore]", "registerMBean, getAttribute, invoke";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestNetworkRegistry#*[test:type=TestNetworkRegistry]", "registerMBean, unregisterMBean, getAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestServerInvocationHandler#*[test:type=TestServerInvocationHandler]", "registerMBean, getAttribute, invoke";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestServerSocketFactory#*[test:type=SSLServerSocketFactoryService]", "registerMBean, getAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.config.FactoryConfigTestCaseParent$SelfIdentifyingServerSocketFactory#-[jboss:type=serversocketfactory]", "registerMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.http.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#-[jboss:type=serversocketfactory]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#-[jboss:type=serversocketfactory]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase$SerializableServerSocketFactory#-[jboss:type=serversocketfactory2]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase$SerializableServerSocketFactory#-[jboss:type=serversocketfactory]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.socket.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#-[jboss:type=serversocketfactory]", "registerMBean";
+
+ permission javax.management.MBeanServerPermission "createMBeanServer, findMBeanServer";
+
+ // org.jboss.test.remoting.classloader.InvokerTestCase
+ permission java.io.FilePermission "${build.home}${/}lib${/}-", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}lib${/}jboss-remoting.jar", "read";
+ permission java.lang.RuntimePermission "accessDeclaredMembers";
+
+ // org.jboss.test.remoting.transport.connector.ObjectNameWithZeroesAddressTestCase
+ permission javax.management.MBeanPermission "*#-[*:*]", "queryMBeans";
+
+ // Several test cases.
+ permission java.util.PropertyPermission "jrunit.bind_addr", "read";
+
+ // org.jboss.ant.taskdefs.XMLJUnitMultipleResultFormatter
+ permission java.util.PropertyPermission "jboss-junit-configuration", "read";
+
+ // This is technically the JNP server, but it seems intentional - note that this might mask other problems though
+ permission java.net.SocketPermission "*:*", "accept, connect, resolve";
+
+ // jndi detection test cases
+ permission java.util.PropertyPermission "java.naming.factory.initial", "write";
+ permission java.util.PropertyPermission "jboss.global.jnp.disableDiscovery", "read";
+ permission org.jboss.naming.JndiPermission "detection", "createSubcontext";
+ permission org.jboss.naming.JndiPermission "detection", "listBindings";
+ permission org.jboss.naming.JndiPermission "detection", "lookup";
+ permission org.jboss.naming.JndiPermission "detection/*", "rebind";
+ permission org.jboss.naming.JndiPermission "detection/*", "unbind";
+
+ // MalformedLocatorTestCase, RemoteClassloaderTestCase
+ permission java.lang.RuntimePermission "setIO";
+
+ // MalformedLocatorTestCase
+ permission java.util.PropertyPermission "suppressHostWarning", "write";
+
+ // org.jboss.test.remoting.security.InvokerRegistryUpdateTestCase
+ permission java.lang.RuntimePermission "invokerRegistryUpdate";
+
+ // TODO - this stuff ought to be in privileged blocks within the Ant JUnit task
+ permission java.util.PropertyPermission "*", "read, write"; // ugh
+
+ // TESTING ONLY - Use with the LoggingSecurityManager to locate needed permissions for the above block
+// permission java.security.AllPermission;
+
+/////////////////////////////////////////////////////////////////////////////////////////////
+// TODO - We should use a version of JBoss logging + log4j that does this stuff in privileged blocks
+
+ permission java.io.FilePermission "${build.home}${/}src${/}etc${/}log4j.properties", "read";
+ permission java.io.FilePermission "${build.home}${/}src${/}etc${/}log4j.xml", "read";
+ permission java.io.FilePermission "${build.home}${/}lib${/}apache-log4j${/}lib${/}log4j.jar", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}classes${/}-", "read";
+ permission java.lang.RuntimePermission "accessClassInPackage.*";
+ permission java.util.PropertyPermission "org.jboss.logging.Logger.pluginClass", "read";
+ permission java.util.PropertyPermission "log4j.defaultInitOverride", "read";
+ permission java.util.PropertyPermission "elementAttributeLimit", "read";
+ permission java.util.PropertyPermission "maxOccurLimit", "read";
+ permission java.util.PropertyPermission "entityExpansionLimit", "read";
+ permission java.util.PropertyPermission "javax.xml.parsers.DocumentBuilderFactory", "read";
+ permission java.util.PropertyPermission "log4j.ignoreTCL", "read";
+ permission java.util.PropertyPermission "log4j.configuratorClass", "read";
+ permission java.util.PropertyPermission "log4j.configDebug", "read";
+ permission java.util.PropertyPermission "log4j.debug", "read";
+ permission java.util.PropertyPermission "log4j.configuration", "read";
+ permission java.util.PropertyPermission "org.apache.commons.logging.LogFactory", "read";
+ permission java.util.PropertyPermission "org.apache.commons.logging.Log", "read";
+};
+
+//****************************************************************************************************************************************************************
+//****************************************************************************************************************************************************************
+//****************************************************************************
+//**** Permissions used by the test suite ****
+//**** (tests.functional.main, tests.functional.main.http, ****
+//**** tests.functional.main.core, and tests.functional.main.http.core) ****
+//****************************************************************************
+//****************************************************************************
+
+grant codeBase "file:${build.home}/output/lib/jboss-remoting-invokerregistry-test.jar"
+{
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}classloader${/}race${/}test.jar", "read";
+
+ // Used by the descendents of org.jboss.test.remoting.shutdown.ShutdownTestParent.
+ permission java.io.FilePermission "<<ALL FILES>>", "execute";
+
+ permission java.lang.reflect.ReflectPermission "suppressAccessChecks";
+
+ permission java.lang.RuntimePermission "enableContextClassLoaderOverride";
+ permission java.lang.RuntimePermission "createClassLoader";
+ permission java.lang.RuntimePermission "getClassLoader";
+ permission java.lang.RuntimePermission "setContextClassLoader";
+ permission java.lang.RuntimePermission "org.jboss.naming.NamingContext.getLocal";
+
+ permission javax.management.MBeanTrustPermission "register";
+
+ permission javax.management.MBeanPermission "org.jboss.remoting.detection.jndi.JNDIDetector#-[remoting:type=JNDIDetector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.detection.multicast.MulticastDetector#-[remoting:*]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.remoting.detection.multicast.MulticastDetector#*[test:type=MulticastDetector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.network.NetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf, addNotificationListener";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#-[jboss:type=serversocketfactory2]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#-[*:type=serversocketfactory]", "registerMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#createServerSocket[jboss:*]", "invoke";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#createServerSocket[test:type=serversocketfactory]", "invoke";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.*#-[jboss.remoting:service=invoker,*]", "unregisterMBean, registerMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[jboss.remoting:type=Connector,*]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[jboss:type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:transport=socket,type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:transport=sslsocket,type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:transport=coyote,type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:type=Connector]","registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.socket.SocketServerInvoker#Configuration[jboss.remoting:service=invoker,*]", "getAttribute";
+
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.jndi.JNDIDetectorTest1$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.jndi.JNDIDetectorTest2$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.metadata.MetadataTestCase$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf, addNotificationListener";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.handler.mbean.MBeanHandler#-[test:type=handler]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.lease.InjectedConnectionListenerTestCase$TestConnectionListener#-[jboss:type=connectionlistener]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.lease.InjectedConnectionListenerTestCase$TestConnectionListener#handleConnectionException[jboss:type=connectionlistener]", "invoke";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestCallbackErrorHandler#*[test:type=TestCallbackErrorHandler]", "registerMBean, getAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestCallbackStore#*[test:type=Callbackstore]", "registerMBean, getAttribute, invoke";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestNetworkRegistry#*[test:type=TestNetworkRegistry]", "registerMBean, unregisterMBean, getAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestServerInvocationHandler#*[test:type=TestServerInvocationHandler]", "registerMBean, getAttribute, invoke";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestServerSocketFactory#*[test:type=SSLServerSocketFactoryService]", "registerMBean, getAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.config.FactoryConfigTestCaseParent$SelfIdentifyingServerSocketFactory#-[jboss:type=serversocketfactory]", "registerMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.http.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#-[jboss:type=serversocketfactory]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#-[jboss:type=serversocketfactory]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase$SerializableServerSocketFactory#-[jboss:type=serversocketfactory2]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase$SerializableServerSocketFactory#-[jboss:type=serversocketfactory]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.socket.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#-[jboss:type=serversocketfactory]", "registerMBean";
+
+ permission javax.management.MBeanServerPermission "createMBeanServer, findMBeanServer";
+
+ // org.jboss.test.remoting.classloader.InvokerTestCase
+ permission java.io.FilePermission "${build.home}${/}lib${/}-", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}lib${/}jboss-remoting.jar", "read";
+ permission java.lang.RuntimePermission "accessDeclaredMembers";
+
+ // org.jboss.test.remoting.transport.connector.ObjectNameWithZeroesAddressTestCase
+ permission javax.management.MBeanPermission "*#-[*:*]", "queryMBeans";
+
+ // Several test cases.
+ permission java.util.PropertyPermission "jrunit.bind_addr", "read";
+
+ // org.jboss.ant.taskdefs.XMLJUnitMultipleResultFormatter
+ permission java.util.PropertyPermission "jboss-junit-configuration", "read";
+
+ // This is technically the JNP server, but it seems intentional - note that this might mask other problems though
+ permission java.net.SocketPermission "*:*", "accept, connect, resolve";
+
+ // jndi detection test cases
+ permission java.util.PropertyPermission "java.naming.factory.initial", "write";
+ permission java.util.PropertyPermission "jboss.global.jnp.disableDiscovery", "read";
+ permission org.jboss.naming.JndiPermission "detection", "createSubcontext";
+ permission org.jboss.naming.JndiPermission "detection", "listBindings";
+ permission org.jboss.naming.JndiPermission "detection", "lookup";
+ permission org.jboss.naming.JndiPermission "detection/*", "rebind";
+ permission org.jboss.naming.JndiPermission "detection/*", "unbind";
+
+ // MalformedLocatorTestCase, RemoteClassloaderTestCase
+ permission java.lang.RuntimePermission "setIO";
+
+ // MalformedLocatorTestCase
+ permission java.util.PropertyPermission "suppressHostWarning", "write";
+
+ // TODO - this stuff ought to be in privileged blocks within the Ant JUnit task
+ permission java.util.PropertyPermission "*", "read, write"; // ugh
+
+ // TESTING ONLY - Use with the LoggingSecurityManager to locate needed permissions for the above block
+// permission java.security.AllPermission;
+
+/////////////////////////////////////////////////////////////////////////////////////////////
+// TODO - We should use a version of JBoss logging + log4j that does this stuff in privileged blocks
+
+ permission java.io.FilePermission "${build.home}${/}src${/}etc${/}log4j.properties", "read";
+ permission java.io.FilePermission "${build.home}${/}src${/}etc${/}log4j.xml", "read";
+ permission java.io.FilePermission "${build.home}${/}lib${/}apache-log4j${/}lib${/}log4j.jar", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}classes${/}-", "read";
+ permission java.lang.RuntimePermission "accessClassInPackage.*";
+ permission java.util.PropertyPermission "org.jboss.logging.Logger.pluginClass", "read";
+ permission java.util.PropertyPermission "log4j.defaultInitOverride", "read";
+ permission java.util.PropertyPermission "elementAttributeLimit", "read";
+ permission java.util.PropertyPermission "maxOccurLimit", "read";
+ permission java.util.PropertyPermission "entityExpansionLimit", "read";
+ permission java.util.PropertyPermission "javax.xml.parsers.DocumentBuilderFactory", "read";
+ permission java.util.PropertyPermission "log4j.ignoreTCL", "read";
+ permission java.util.PropertyPermission "log4j.configuratorClass", "read";
+ permission java.util.PropertyPermission "log4j.configDebug", "read";
+ permission java.util.PropertyPermission "log4j.debug", "read";
+ permission java.util.PropertyPermission "log4j.configuration", "read";
+ permission java.util.PropertyPermission "org.apache.commons.logging.LogFactory", "read";
+ permission java.util.PropertyPermission "org.apache.commons.logging.Log", "read";
+};
+
+//****************************************************************************************************************************************************************
+//****************************************************************************************************************************************************************
+//******************************************************************
+//**** Permissions for third party libraries ****
+//******************************************************************
+//******************************************************************
+
+grant codeBase "file:${build.home}/lib/-"
+{
+ permission java.security.AllPermission;
+};
+
+grant codeBase "file:${ant.library.dir}/-"
+{
+ permission java.security.AllPermission;
+};
\ No newline at end of file
14 years, 4 months
JBoss Remoting SVN: r5900 - remoting2/branches/2.x/src/etc.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2010-07-03 15:16:26 -0400 (Sat, 03 Jul 2010)
New Revision: 5900
Modified:
remoting2/branches/2.x/src/etc/remoting.security.policy.tests
Log:
JBREM-1231: Added RuntimePermission("invokerRegistryUpdate").
Modified: remoting2/branches/2.x/src/etc/remoting.security.policy.tests
===================================================================
--- remoting2/branches/2.x/src/etc/remoting.security.policy.tests 2010-07-03 19:15:57 UTC (rev 5899)
+++ remoting2/branches/2.x/src/etc/remoting.security.policy.tests 2010-07-03 19:16:26 UTC (rev 5900)
@@ -200,6 +200,9 @@
// MalformedLocatorTestCase
permission java.util.PropertyPermission "suppressHostWarning", "write";
+
+ // org.jboss.test.remoting.security.InvokerRegistryUpdateTestCase
+ permission java.lang.RuntimePermission "invokerRegistryUpdate";
// TODO - this stuff ought to be in privileged blocks within the Ant JUnit task
permission java.util.PropertyPermission "*", "read, write"; // ugh
14 years, 4 months
JBoss Remoting SVN: r5899 - remoting2/branches/2.x/src/etc.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2010-07-03 15:15:57 -0400 (Sat, 03 Jul 2010)
New Revision: 5899
Modified:
remoting2/branches/2.x/src/etc/remoting.security.policy.core
Log:
JBREM-1231: Added RuntimePermission("invokerRegistryUpdate").
Modified: remoting2/branches/2.x/src/etc/remoting.security.policy.core
===================================================================
--- remoting2/branches/2.x/src/etc/remoting.security.policy.core 2010-07-03 19:03:02 UTC (rev 5898)
+++ remoting2/branches/2.x/src/etc/remoting.security.policy.core 2010-07-03 19:15:57 UTC (rev 5899)
@@ -27,8 +27,8 @@
//**** with the permissions necessary to run the code in the org.jboss.remoting.*
//**** packages. All security sensitive calls in Remoting are wrapped in a
//**** java.security.AccessController.doPrivileged() call, so that Remoting classes
-//**** can function in the context of a java.lang.SecurityManager, given the some
-//**** variation on the permissionslisted below, even if the calling code runs without
+//**** can function in the context of a java.lang.SecurityManager, given some
+//**** variation on the permissions listed below, even if the calling code runs without
//**** these restrictions.
//****
//**** There are a few ways in which it may be necessary or desirable to modify the
@@ -176,7 +176,10 @@
permission java.lang.RuntimePermission "loadLibrary.tcnative-1";
permission java.lang.RuntimePermission "loadLibrary.libtcnative-1";
+ // Used to guard access to InvokerRegistry state
+ permission java.lang.RuntimePermission "invokerRegistryUpdate";
+
/////////////////////////////////////////////////////////////////////////////////////////////
// Socket permissions. Can't create sockets without it.
14 years, 4 months
JBoss Remoting SVN: r5898 - remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/timeout.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2010-07-03 15:03:02 -0400 (Sat, 03 Jul 2010)
New Revision: 5898
Modified:
remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/timeout/SocketDefaultTimeoutTestCase.java
Log:
JBREM-1231: Wrapped all state changing calls to InvokerRegistry in PrivilegedAction.
Modified: remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/timeout/SocketDefaultTimeoutTestCase.java
===================================================================
--- remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/timeout/SocketDefaultTimeoutTestCase.java 2010-07-03 19:01:53 UTC (rev 5897)
+++ remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/timeout/SocketDefaultTimeoutTestCase.java 2010-07-03 19:03:02 UTC (rev 5898)
@@ -25,6 +25,8 @@
import java.io.IOException;
import java.lang.reflect.Method;
import java.net.InetAddress;
+import java.security.AccessController;
+import java.security.PrivilegedAction;
import java.util.HashMap;
import java.util.Map;
@@ -88,7 +90,15 @@
ConsoleAppender consoleAppender = new ConsoleAppender(layout);
Logger.getRootLogger().addAppender(consoleAppender);
}
- InvokerRegistry.registerInvokerFactories(getTransport(), getClientFactoryClass(), TestServerFactory.class);
+
+ AccessController.doPrivileged( new PrivilegedAction()
+ {
+ public Object run()
+ {
+ InvokerRegistry.registerInvokerFactories(getTransport(), getClientFactoryClass(), TestServerFactory.class);
+ return null;
+ }
+ });
}
14 years, 4 months
JBoss Remoting SVN: r5897 - remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/shutdown.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2010-07-03 15:01:53 -0400 (Sat, 03 Jul 2010)
New Revision: 5897
Modified:
remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/shutdown/ProcessInvocationShutdownTestCase.java
Log:
JBREM-1231: Wrapped all state changing calls to InvokerRegistry in PrivilegedAction.
Modified: remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/shutdown/ProcessInvocationShutdownTestCase.java
===================================================================
--- remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/shutdown/ProcessInvocationShutdownTestCase.java 2010-07-03 19:01:29 UTC (rev 5896)
+++ remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/shutdown/ProcessInvocationShutdownTestCase.java 2010-07-03 19:01:53 UTC (rev 5897)
@@ -23,6 +23,8 @@
import java.io.IOException;
import java.net.InetAddress;
+import java.security.AccessController;
+import java.security.PrivilegedAction;
import java.util.HashMap;
import java.util.Map;
@@ -147,7 +149,15 @@
protected void setupServer() throws Exception
{
- InvokerRegistry.registerInvokerFactories(getTransport(), TransportClientFactory.class, TestTransportServerFactory.class);
+ AccessController.doPrivileged( new PrivilegedAction()
+ {
+ public Object run()
+ {
+ InvokerRegistry.registerInvokerFactories(getTransport(), TransportClientFactory.class, TestTransportServerFactory.class);
+ return null;
+ }
+ });
+
host = InetAddress.getLocalHost().getHostAddress();
port = PortUtil.findFreePort(host);
locatorURI = getTransport() + "://" + host + ":" + port;
14 years, 4 months
JBoss Remoting SVN: r5896 - remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2010-07-03 15:01:29 -0400 (Sat, 03 Jul 2010)
New Revision: 5896
Modified:
remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/ErrorTestCase.java
Log:
JBREM-1231: Wrapped all state changing calls to InvokerRegistry in PrivilegedAction.
Modified: remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/ErrorTestCase.java
===================================================================
--- remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/ErrorTestCase.java 2010-07-03 19:01:00 UTC (rev 5895)
+++ remoting2/branches/2.x/src/tests/org/jboss/test/remoting/transport/socket/ErrorTestCase.java 2010-07-03 19:01:29 UTC (rev 5896)
@@ -27,6 +27,8 @@
import java.io.OutputStream;
import java.net.InetAddress;
import java.net.Socket;
+import java.security.AccessController;
+import java.security.PrivilegedAction;
import java.util.HashMap;
import java.util.LinkedList;
import java.util.Map;
@@ -94,7 +96,16 @@
ConsoleAppender consoleAppender = new ConsoleAppender(layout);
Logger.getRootLogger().addAppender(consoleAppender);
}
- InvokerRegistry.registerInvokerFactories(getTransport(), TestClientFactory.class, TestServerFactory.class);
+
+ AccessController.doPrivileged( new PrivilegedAction()
+ {
+ public Object run()
+ {
+ InvokerRegistry.registerInvokerFactories(getTransport(), TestClientFactory.class, TestServerFactory.class);
+ return null;
+ }
+ });
+
TestServerThread.threadCounter = 0;
}
14 years, 4 months