use of java.security.SecurityPermission in project wildfly by wildfly.
the class DatabaseTimerServiceRefreshTestCase method createDeployment.
private static Archive<?> createDeployment(boolean client) {
final WebArchive war = ShrinkWrap.create(WebArchive.class, ARCHIVE_NAME + ".war");
war.addClasses(RefreshInterceptor.class, RefreshIF.class, RefreshBeanBase.class, RefreshBean1.class, RefreshBean2.class);
war.addAsWebInfResource(DatabaseTimerServiceRefreshTestCase.class.getPackage(), "jboss-ejb3.xml", "jboss-ejb3.xml");
if (client) {
war.addAsManifestResource(DatabaseTimerServiceRefreshTestCase.class.getPackage(), "jboss-ejb-client-refresh-test.xml", "jboss-ejb-client.xml");
war.addAsManifestResource(createPermissionsXmlAsset(new SocketPermission("*:9092", "connect,resolve"), new SecurityPermission("putProviderProperty.WildFlyElytron")), "permissions.xml");
}
return war;
}
use of java.security.SecurityPermission in project wildfly by wildfly.
the class RemoteLocalCallTestCase method deployment1.
@Deployment(name = "client")
@TargetsContainer("multinode-client")
public static Archive<?> deployment1() {
JavaArchive jar = createJar(ARCHIVE_NAME_CLIENT);
jar.addClasses(RemoteLocalCallTestCase.class);
jar.addAsManifestResource("META-INF/jboss-ejb-client-receivers.xml", "jboss-ejb-client.xml");
jar.addAsManifestResource(createPermissionsXmlAsset(createFilePermission("delete", "jbossas.multinode.client", Arrays.asList("standalone", "data", "ejb-xa-recovery", "-")), createFilePermission("read", "jboss.home", Arrays.asList("standalone", "tmp", "auth", "-")), new SecurityPermission("putProviderProperty.WildFlyElytron")), "permissions.xml");
return jar;
}
use of java.security.SecurityPermission in project guava by hceylan.
the class JSR166TestCase method runWithPermissions.
/**
* Runs Runnable r with a security policy that permits precisely
* the specified permissions. If there is no current security
* manager, the runnable is run twice, both with and without a
* security manager. We require that any security manager permit
* getPolicy/setPolicy.
*/
public void runWithPermissions(Runnable r, Permission... permissions) {
SecurityManager sm = System.getSecurityManager();
if (sm == null) {
r.run();
Policy savedPolicy = Policy.getPolicy();
try {
Policy.setPolicy(permissivePolicy());
System.setSecurityManager(new SecurityManager());
runWithPermissions(r, permissions);
} finally {
System.setSecurityManager(null);
Policy.setPolicy(savedPolicy);
}
} else {
Policy savedPolicy = Policy.getPolicy();
AdjustablePolicy policy = new AdjustablePolicy(permissions);
Policy.setPolicy(policy);
try {
r.run();
} finally {
policy.addPermission(new SecurityPermission("setPolicy"));
Policy.setPolicy(savedPolicy);
}
}
}
use of java.security.SecurityPermission in project guava by google.
the class JSR166TestCase method runWithPermissions.
/**
* Runs Runnable r with a security policy that permits precisely the specified permissions. If
* there is no current security manager, the runnable is run twice, both with and without a
* security manager. We require that any security manager permit getPolicy/setPolicy.
*/
public void runWithPermissions(Runnable r, Permission... permissions) {
SecurityManager sm = System.getSecurityManager();
if (sm == null) {
r.run();
Policy savedPolicy = Policy.getPolicy();
try {
Policy.setPolicy(permissivePolicy());
System.setSecurityManager(new SecurityManager());
runWithPermissions(r, permissions);
} finally {
System.setSecurityManager(null);
Policy.setPolicy(savedPolicy);
}
} else {
Policy savedPolicy = Policy.getPolicy();
AdjustablePolicy policy = new AdjustablePolicy(permissions);
Policy.setPolicy(policy);
try {
r.run();
} finally {
policy.addPermission(new SecurityPermission("setPolicy"));
Policy.setPolicy(savedPolicy);
}
}
}
use of java.security.SecurityPermission in project java-cloudant by cloudant.
the class LoggingTest method dnsWarningPermissionDenied.
/**
* Test that a warning is logged if the DNS lifetime cannot be checked because of security
* permissions.
*
* @throws Exception
*/
@Test
public void dnsWarningPermissionDenied(@Mocked final SecurityManager mockSecurityManager) throws Exception {
// Record the mock expectations
new Expectations() {
{
mockSecurityManager.checkPermission(new SecurityPermission("getProperty" + ".networkaddress.cache.ttl"));
result = new SecurityException("Test exception to deny property access.");
times = 1;
}
};
logger = setupLogger(ClientBuilder.class, Level.WARNING);
try {
System.setSecurityManager(mockSecurityManager);
CloudantClientHelper.getClientBuilder().build();
} finally {
// Unset the mock security manager
System.setSecurityManager(null);
}
// Assert a warning was received
assertEquals(1, handler.logEntries.size(), "There should be 1 log entry");
// Assert that it matches the expected pattern
assertLogMessage("Permission denied to check Java DNS cache TTL\\. .*", 0);
}
Aggregations