JBoss Remoting SVN: r4148 - remoting2/branches/2.x/src/etc.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2008-05-08 05:08:41 -0400 (Thu, 08 May 2008)
New Revision: 4148
Modified:
remoting2/branches/2.x/src/etc/remoting.security.policy.tests.marshal
Log:
JBREM-920: (1) Added permission to read remotely loaded files; (2) removed some irrelevant permissions.
Modified: remoting2/branches/2.x/src/etc/remoting.security.policy.tests.marshal
===================================================================
--- remoting2/branches/2.x/src/etc/remoting.security.policy.tests.marshal 2008-05-08 09:03:47 UTC (rev 4147)
+++ remoting2/branches/2.x/src/etc/remoting.security.policy.tests.marshal 2008-05-08 09:08:41 UTC (rev 4148)
@@ -28,14 +28,8 @@
grant codeBase "file:${build.home}/output/lib/jboss-remoting.jar"
{
- // Permission to read test keystores
- permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}-", "read";
-
- // Permission for org.jboss.remoting.callback.CallbackStore
- permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}-", "read, write, delete";
-
- // org.jboss.test.remoting.detection.metadata.MetadataTestCase
- permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.metadata.MetadataTestCase$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "isInstanceOf";
+ // Permissions to read remotely loaded classes.
+ permission java.io.FilePermission "${build.home}${/}output${/}lib${/}jboss-remoting-loading-tests.jar", "read";
// org.jboss.ant.taskdefs.XMLJUnitMultipleResultFormatter calls
// org.jboss.remoting.util.SystemUtility
16 years
JBoss Remoting SVN: r4147 - remoting2/branches/2.x/src/main/org/jboss/remoting/util.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2008-05-08 05:03:47 -0400 (Thu, 08 May 2008)
New Revision: 4147
Modified:
remoting2/branches/2.x/src/main/org/jboss/remoting/util/SecurityUtility.java
Log:
JBREM-978: Added some file oriented methods.
Modified: remoting2/branches/2.x/src/main/org/jboss/remoting/util/SecurityUtility.java
===================================================================
--- remoting2/branches/2.x/src/main/org/jboss/remoting/util/SecurityUtility.java 2008-05-08 09:02:53 UTC (rev 4146)
+++ remoting2/branches/2.x/src/main/org/jboss/remoting/util/SecurityUtility.java 2008-05-08 09:03:47 UTC (rev 4147)
@@ -113,8 +113,59 @@
// FilePermission methods
///////////////////////////////////////////////////////////////////////////////////////
+ static public File createTempFile(final String prefix, final String suffix, final boolean deleteOnExit) throws IOException
+ {
+ if (skipAccessControl)
+ {
+ File file = File.createTempFile(prefix, suffix);
+ if (deleteOnExit) file.deleteOnExit();
+ return file;
+ }
+
+ try
+ {
+ return (File)AccessController.doPrivileged( new PrivilegedExceptionAction()
+ {
+ public Object run() throws IOException
+ {
+ File file = File.createTempFile(prefix, suffix);
+ if (deleteOnExit) file.deleteOnExit();
+ return file;
+ }
+ });
+ }
+ catch (PrivilegedActionException e)
+ {
+ throw (IOException) e.getCause();
+ }
+ }
+
+ static public void deleteOnExit(final File file)
+ {
+ if (file == null)
+ return;
+
+ if (skipAccessControl)
+ {
+ file.deleteOnExit();
+ return;
+ }
+
+ AccessController.doPrivileged( new PrivilegedAction()
+ {
+ public Object run()
+ {
+ file.deleteOnExit();
+ return null;
+ }
+ });
+ }
+
static public boolean fileExists(final File file)
{
+ if (file == null)
+ return false;
+
if (skipAccessControl)
{
return file.exists();
@@ -170,7 +221,6 @@
}
}
-
static public FileInputStream getFileInputStream(final String path) throws FileNotFoundException
{
if (skipAccessControl)
16 years
JBoss Remoting SVN: r4146 - remoting2/branches/2.x/src/main/org/jboss/remoting/serialization.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2008-05-08 05:02:53 -0400 (Thu, 08 May 2008)
New Revision: 4146
Modified:
remoting2/branches/2.x/src/main/org/jboss/remoting/serialization/ClassLoaderUtility.java
Log:
JBREM-978: Added log statements in catch blocks.
Modified: remoting2/branches/2.x/src/main/org/jboss/remoting/serialization/ClassLoaderUtility.java
===================================================================
--- remoting2/branches/2.x/src/main/org/jboss/remoting/serialization/ClassLoaderUtility.java 2008-05-08 08:57:16 UTC (rev 4145)
+++ remoting2/branches/2.x/src/main/org/jboss/remoting/serialization/ClassLoaderUtility.java 2008-05-08 09:02:53 UTC (rev 4146)
@@ -24,12 +24,15 @@
import java.security.AccessController;
import java.security.PrivilegedAction;
+import org.apache.log4j.Logger;
+
/**
* @author <a href="mailto:clebert.suconic@jboss.com">Clebert Suconic</a>
*/
public class ClassLoaderUtility
{
-
+ static Logger log = Logger.getLogger(ClassLoaderUtility.class);
+
/**
* Tries to load the class from the current thread's context class loader. If
* not successful, tries to load the class from the current instance.
@@ -59,6 +62,7 @@
}
catch (Throwable t)
{
+ log.debug("Context classloader can't find class: " + classname, t);
}
if (clazz != null)
@@ -79,6 +83,7 @@
}
catch (Throwable t)
{
+ log.debug("clazz classloader can't find class: " + classname, t);
}
}
@@ -98,6 +103,7 @@
}
catch (Throwable t)
{
+ log.debug("system classloader can't find class: " + classname, t);
}
throw new ClassNotFoundException(classname);
@@ -135,6 +141,7 @@
}
catch (Throwable t)
{
+ log.debug("clazz classloader can't find class: " + classname, t);
}
}
@@ -154,6 +161,7 @@
}
catch (Throwable t)
{
+ log.debug("context classloader can't find class: " + classname, t);
}
@@ -173,6 +181,7 @@
}
catch (Throwable t)
{
+ log.debug("system classloader can't find class: " + classname, t);
}
throw new ClassNotFoundException(classname);
16 years
JBoss Remoting SVN: r4145 - remoting2/branches/2.x/src/main/org/jboss/remoting/loading.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2008-05-08 04:57:16 -0400 (Thu, 08 May 2008)
New Revision: 4145
Modified:
remoting2/branches/2.x/src/main/org/jboss/remoting/loading/ClassUtil.java
Log:
JBREM-978: Wrapped call to ClassLoader.getResourceAsStream() in AccessController.doPrivileged().
Modified: remoting2/branches/2.x/src/main/org/jboss/remoting/loading/ClassUtil.java
===================================================================
--- remoting2/branches/2.x/src/main/org/jboss/remoting/loading/ClassUtil.java 2008-05-08 08:47:11 UTC (rev 4144)
+++ remoting2/branches/2.x/src/main/org/jboss/remoting/loading/ClassUtil.java 2008-05-08 08:57:16 UTC (rev 4145)
@@ -211,7 +211,22 @@
}
if(cl != null)
{
- in = cl.getResourceAsStream(cn);
+ try
+ {
+ final ClassLoader fcl = cl;
+ final String fcn = cn;
+ in = (InputStream) AccessController.doPrivileged( new PrivilegedAction()
+ {
+ public Object run()
+ {
+ return fcl.getResourceAsStream(fcn);
+ }
+ });
+ }
+ catch (Exception e)
+ {
+ log.error("error getting resource " + cn, e);
+ }
if(in != null)
{
if(log.isTraceEnabled())
16 years
JBoss Remoting SVN: r4144 - remoting2/branches/2.x/src/main/org/jboss/remoting/loading.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2008-05-08 04:47:11 -0400 (Thu, 08 May 2008)
New Revision: 4144
Modified:
remoting2/branches/2.x/src/main/org/jboss/remoting/loading/ClassByteClassLoader.java
Log:
JBREM-978: Makes some file oriented calls through SecurityUtility.
Modified: remoting2/branches/2.x/src/main/org/jboss/remoting/loading/ClassByteClassLoader.java
===================================================================
--- remoting2/branches/2.x/src/main/org/jboss/remoting/loading/ClassByteClassLoader.java 2008-05-08 08:35:59 UTC (rev 4143)
+++ remoting2/branches/2.x/src/main/org/jboss/remoting/loading/ClassByteClassLoader.java 2008-05-08 08:47:11 UTC (rev 4144)
@@ -26,8 +26,8 @@
import org.jboss.remoting.util.SecurityUtility;
import java.io.File;
-import java.io.FileOutputStream;
import java.io.IOException;
+import java.io.InputStream;
import java.io.OutputStream;
import java.lang.ref.Reference;
import java.lang.ref.ReferenceQueue;
@@ -208,13 +208,12 @@
File file = null;
try
{
- file = File.createTempFile("cbc", ".class");
- file.deleteOnExit();
+ file = SecurityUtility.createTempFile("cbc", ".class", true);
if(log.isTraceEnabled())
{
log.trace("adding resource at: " + name + " to file: " + file);
}
- out = new FileOutputStream(file);
+ out = SecurityUtility.getFileOutputStream(file);
out.write(buf);
out.flush();
}
@@ -254,15 +253,16 @@
{
log.trace("getResourceAsStream =>" + denormalized + " = " + file);
}
- if(file != null && file.exists())
+ if(file != null && SecurityUtility.fileExists(file))
{
try
{
- return new java.io.BufferedInputStream(new java.io.FileInputStream(file));
+ InputStream is = SecurityUtility.getFileInputStream(file);
+ return new java.io.BufferedInputStream(is);
}
catch(Exception ex)
{
-
+ log.debug("file doesn't exist", ex);
}
}
return super.getResourceAsStream(name);
16 years
JBoss Remoting SVN: r4143 - remoting2/branches/2.x/src/etc.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2008-05-08 04:35:59 -0400 (Thu, 08 May 2008)
New Revision: 4143
Modified:
remoting2/branches/2.x/src/etc/remoting.security.policy.core
Log:
JBREM-978: Added file permissions for ClassByteClassLoader.
Modified: remoting2/branches/2.x/src/etc/remoting.security.policy.core
===================================================================
--- remoting2/branches/2.x/src/etc/remoting.security.policy.core 2008-05-08 00:04:17 UTC (rev 4142)
+++ remoting2/branches/2.x/src/etc/remoting.security.policy.core 2008-05-08 08:35:59 UTC (rev 4143)
@@ -77,6 +77,9 @@
permission java.io.FilePermission ".", "read, write";
permission java.io.FilePermission "*", "read, write";
+ // Used by org.jboss.remoting.loading.ClassByteClassLoader.
+ permission java.io.FilePermission "${java.io.tmpdir}${/}*", "read, write, delete";
+
// // Some variation of the following would be needed for SSL transports:
// permission java.io.FilePermission "${keystore}", "read";
// permission java.io.FilePermission "${truststore}", "read";
16 years
JBoss Remoting SVN: r4142 - remoting2/branches/2.x/lib/jboss.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2008-05-07 20:04:17 -0400 (Wed, 07 May 2008)
New Revision: 4142
Modified:
remoting2/branches/2.x/lib/jboss/README
Log:
JBREM-920: Added note about new jrunit.jar.
Modified: remoting2/branches/2.x/lib/jboss/README
===================================================================
--- remoting2/branches/2.x/lib/jboss/README 2008-05-08 00:00:17 UTC (rev 4141)
+++ remoting2/branches/2.x/lib/jboss/README 2008-05-08 00:04:17 UTC (rev 4142)
@@ -15,4 +15,6 @@
12/12/07: A new jrunit.jar has been committed.
-04/30/08: A new jrunit.jar has been committed, built from jrunit CVS version remoting_binary_043008.
\ No newline at end of file
+04/30/08: A new jrunit.jar has been committed, built from jrunit CVS version remoting_binary_043008.
+
+05/07/08: A new jrunit.jar has been committed, built from jrunit CVS version remoting_binary_050708.
\ No newline at end of file
16 years
JBoss Remoting SVN: r4141 - remoting2/branches/2.x/lib/jboss.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2008-05-07 20:00:17 -0400 (Wed, 07 May 2008)
New Revision: 4141
Modified:
remoting2/branches/2.x/lib/jboss/jrunit.jar
Log:
JBREM-920: New jrunit.jar which passes additional system properties to client/server JVMs.
Modified: remoting2/branches/2.x/lib/jboss/jrunit.jar
===================================================================
(Binary files differ)
16 years
JBoss Remoting SVN: r4140 - remoting2/branches/2.x/src/etc.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2008-05-07 19:52:09 -0400 (Wed, 07 May 2008)
New Revision: 4140
Modified:
remoting2/branches/2.x/src/etc/remoting.security.policy.tests.minimal
Log:
JBREM-920, JBREM-977: Added permissions (1) to read keystores and (2) read some system properties.
Modified: remoting2/branches/2.x/src/etc/remoting.security.policy.tests.minimal
===================================================================
--- remoting2/branches/2.x/src/etc/remoting.security.policy.tests.minimal 2008-05-07 23:50:33 UTC (rev 4139)
+++ remoting2/branches/2.x/src/etc/remoting.security.policy.tests.minimal 2008-05-07 23:52:09 UTC (rev 4140)
@@ -22,12 +22,43 @@
//****************************************************************************************************************************************************************
//****************************************************************************************************************************************************************
//******************************************************************
+//**** Minimal set of permissions for Remoting classes ****
+//******************************************************************
+//******************************************************************
+
+grant codeBase "file:${remoting.jar.dir}/jboss-remoting.jar"
+{
+ // Permissions to read test keystores and truststores
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}bisocket${/}ssl${/}.keystore", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}bisocket${/}ssl${/}.truststore", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}rmi${/}ssl${/}.keystore", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}rmi${/}ssl${/}.truststore", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}socket${/}ssl${/}.keystore", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}socket${/}ssl${/}.truststore", "read";
+
+ };
+
+//****************************************************************************************************************************************************************
+//****************************************************************************************************************************************************************
+//******************************************************************
//**** Minimal set of permissions for tests ****
//******************************************************************
//******************************************************************
grant codeBase "file:${build.home}/output/tests/classes/-"
-{
+{
+ // Permissions to read test keystores and truststores
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}bisocket${/}ssl${/}.keystore", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}bisocket${/}ssl${/}.truststore", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}rmi${/}ssl${/}.keystore", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}rmi${/}ssl${/}.truststore", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}socket${/}ssl${/}.keystore", "read";
+ permission java.io.FilePermission "${build.home}${/}output${/}tests${/}classes${/}org${/}jboss${/}test${/}remoting${/}transport${/}socket${/}ssl${/}.truststore", "read";
+
+ permission javax.management.MBeanServerPermission "createMBeanServer";
+ permission java.util.PropertyPermission "jrunit.bind_addr", "read";
+ permission java.net.SocketPermission "*:*", "accept,resolve";
+
// org.jboss.test.remoting.transport.InvokerTestDriver
permission java.util.PropertyPermission "remoting.metadata", "read";
permission java.util.PropertyPermission "jvm.mx", "read";
@@ -36,6 +67,12 @@
permission java.net.SocketPermission "*:*", "connect";
permission java.util.PropertyPermission "jboss-junit-configuration", "read";
+ // org.jboss.test.remoting.transport.InvokerClientTest
+ permission java.util.PropertyPermission "remoting.metadata.callback", "read";
+
+ // org.jboss.test.remoting.transport.web.WebInvokerTestClient
+ permission java.util.PropertyPermission "check_content_type", "read";
+
/////////////////////////////////////////////////////////////////////////////////////////////
// TODO - We should use a version of JBoss logging + log4j that does this stuff in privileged blocks
16 years
JBoss Remoting SVN: r4139 - remoting2/branches/2.x/src/etc.
by jboss-remoting-commits@lists.jboss.org
Author: ron.sigal(a)jboss.com
Date: 2008-05-07 19:50:33 -0400 (Wed, 07 May 2008)
New Revision: 4139
Modified:
remoting2/branches/2.x/src/etc/remoting.security.policy.tests
Log:
JBREM-920, JBREM-977: Added permissions for MBean proxy tests.
Modified: remoting2/branches/2.x/src/etc/remoting.security.policy.tests
===================================================================
--- remoting2/branches/2.x/src/etc/remoting.security.policy.tests 2008-05-07 23:49:10 UTC (rev 4138)
+++ remoting2/branches/2.x/src/etc/remoting.security.policy.tests 2008-05-07 23:50:33 UTC (rev 4139)
@@ -36,6 +36,30 @@
// org.jboss.test.remoting.detection.metadata.MetadataTestCase
permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.metadata.MetadataTestCase$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "isInstanceOf";
+
+ // org.jboss.test.remoting.handler.mbean.ServerTest
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.handler.mbean.MBeanHandler#Invoker[test:type=handler]", "setAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.handler.mbean.MBeanHandler#MBeanServer[test:type=handler]", "setAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.handler.mbean.MBeanHandler#*[test:type=handler]", "invoke";
+
+ // org.jboss.test.remoting.security.CallbackErrorHandlerProxyTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestCallbackErrorHandler#*[test:type=TestCallbackErrorHandler]", "setAttribute, invoke";
+
+ // org.jboss.test.remoting.security.CallbackStoreProxyTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestCallbackStore#*[test:type=Callbackstore]", "setAttribute, invoke";
+
+ // org.jboss.test.remoting.security.NetworkRegistryProxyTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestNetworkRegistry#addServer[test:type=TestNetworkRegistry]", "invoke";
+
+ // org.jboss.test.remoting.security.ServerInvokerHandlerProxyTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestServerInvocationHandler#*[test:type=TestServerInvocationHandler]", "setAttribute, invoke";
+
+ // org.jboss.test.remoting.security.ServerSocketFactoryProxyTestCase
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestServerSocketFactory#createServerSocket[test:type=SSLServerSocketFactoryService]", "invoke";
+
+ // Subclasses of org.jboss.test.remoting.transport.config.FactoryConfigTestCaseParent and FactoryConfigTestCaseSSLParent
+ // org.jboss.test.remoting.transport.{http,rmi,socket}.connection.socketfactory.by_mbean.SocketFactoryTestServer
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.socket.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#createServerSocket[jboss:type=serversocketfactory]", "invoke";
};
@@ -64,25 +88,48 @@
permission javax.management.MBeanTrustPermission "register";
+ permission javax.management.MBeanPermission "org.jboss.remoting.detection.jndi.JNDIDetector#-[remoting:type=JNDIDetector]", "registerMBean";
permission javax.management.MBeanPermission "org.jboss.remoting.detection.multicast.MulticastDetector#-[remoting:*]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.remoting.detection.multicast.MulticastDetector#*[test:type=MulticastDetector]", "registerMBean";
permission javax.management.MBeanPermission "org.jboss.remoting.network.NetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf, addNotificationListener";
permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#-[jboss:type=serversocketfactory2]", "registerMBean";
- permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#-[jboss:type=serversocketfactory]", "registerMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#-[*:type=serversocketfactory]", "registerMBean, queryMBeans, isInstanceOf";
permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#createServerSocket[jboss:*]", "invoke";
+ permission javax.management.MBeanPermission "org.jboss.remoting.security.SSLServerSocketFactoryService#createServerSocket[test:type=serversocketfactory]", "invoke";
permission javax.management.MBeanPermission "org.jboss.remoting.transport.*#-[jboss.remoting:service=invoker,*]", "unregisterMBean, registerMBean, queryMBeans, isInstanceOf";
permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[jboss.remoting:type=Connector,*]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[jboss:type=connector]", "registerMBean";
permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:transport=socket,type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:transport=sslsocket,type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:transport=coyote,type=connector]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.remoting.transport.Connector#-[test:type=Connector]","registerMBean";
permission javax.management.MBeanPermission "org.jboss.remoting.transport.socket.SocketServerInvoker#Configuration[jboss.remoting:service=invoker,*]", "getAttribute";
-
+
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.jndi.JNDIDetectorTest1$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.jndi.JNDIDetectorTest2$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean";
permission javax.management.MBeanPermission "org.jboss.test.remoting.detection.metadata.MetadataTestCase$TestNetworkRegistry#-[remoting:type=NetworkRegistry]", "registerMBean, unregisterMBean, queryMBeans, isInstanceOf, addNotificationListener";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.handler.mbean.MBeanHandler#-[test:type=handler]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestCallbackErrorHandler#*[test:type=TestCallbackErrorHandler]", "registerMBean, getAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestCallbackStore#*[test:type=Callbackstore]", "registerMBean, getAttribute, invoke";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestNetworkRegistry#*[test:type=TestNetworkRegistry]", "registerMBean, unregisterMBean, getAttribute";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestServerInvocationHandler#*[test:type=TestServerInvocationHandler]", "registerMBean, getAttribute, invoke";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.security.TestServerSocketFactory#*[test:type=SSLServerSocketFactoryService]", "registerMBean, getAttribute";
permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.config.FactoryConfigTestCaseParent$SelfIdentifyingServerSocketFactory#-[jboss:type=serversocketfactory]", "registerMBean, queryMBeans, isInstanceOf";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.http.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#-[jboss:type=serversocketfactory]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#-[jboss:type=serversocketfactory]", "registerMBean";
permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase$SerializableServerSocketFactory#-[jboss:type=serversocketfactory2]", "registerMBean";
permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.rmi.ssl.config.FactoryConfigTestCase$SerializableServerSocketFactory#-[jboss:type=serversocketfactory]", "registerMBean";
+ permission javax.management.MBeanPermission "org.jboss.test.remoting.transport.socket.connection.socketfactory.by_mbean.SocketFactoryTestServer$ServerSocketFactoryMock#-[jboss:type=serversocketfactory]", "registerMBean";
+
permission javax.management.MBeanServerPermission "createMBeanServer, findMBeanServer";
// org.jboss.test.remoting.transport.connector.ObjectNameWithZeroesAddressTestCase
permission javax.management.MBeanPermission "*#-[*:*]", "queryMBeans";
+ // Several test cases.
+ permission java.util.PropertyPermission "jrunit.bind_addr", "read";
+
// org.jboss.ant.taskdefs.XMLJUnitMultipleResultFormatter
permission java.util.PropertyPermission "jboss-junit-configuration", "read";
@@ -134,4 +181,4 @@
grant codeBase "file:${ant.library.dir}/-"
{
permission java.security.AllPermission;
-};
+};
\ No newline at end of file
16 years