Search in sources :

Example 21 with SecurityPermission

use of java.security.SecurityPermission in project wildfly by wildfly.

the class DatabaseTimerServiceRefreshTestCase method createDeployment.

private static Archive<?> createDeployment(boolean client) {
    final WebArchive war = ShrinkWrap.create(WebArchive.class, ARCHIVE_NAME + ".war");
    war.addClasses(RefreshInterceptor.class, RefreshIF.class, RefreshBeanBase.class, RefreshBean1.class, RefreshBean2.class);
    war.addAsWebInfResource(DatabaseTimerServiceRefreshTestCase.class.getPackage(), "jboss-ejb3.xml", "jboss-ejb3.xml");
    if (client) {
        war.addAsManifestResource(DatabaseTimerServiceRefreshTestCase.class.getPackage(), "jboss-ejb-client-refresh-test.xml", "jboss-ejb-client.xml");
        war.addAsManifestResource(createPermissionsXmlAsset(new SocketPermission("*:9092", "connect,resolve"), new SecurityPermission("putProviderProperty.WildFlyElytron")), "permissions.xml");
    }
    return war;
}
Also used : WebArchive(org.jboss.shrinkwrap.api.spec.WebArchive) SocketPermission(java.net.SocketPermission) SecurityPermission(java.security.SecurityPermission)

Example 22 with SecurityPermission

use of java.security.SecurityPermission in project wildfly by wildfly.

the class RemoteLocalCallTestCase method deployment1.

@Deployment(name = "client")
@TargetsContainer("multinode-client")
public static Archive<?> deployment1() {
    JavaArchive jar = createJar(ARCHIVE_NAME_CLIENT);
    jar.addClasses(RemoteLocalCallTestCase.class);
    jar.addAsManifestResource("META-INF/jboss-ejb-client-receivers.xml", "jboss-ejb-client.xml");
    jar.addAsManifestResource(createPermissionsXmlAsset(createFilePermission("delete", "jbossas.multinode.client", Arrays.asList("standalone", "data", "ejb-xa-recovery", "-")), createFilePermission("read", "jboss.home", Arrays.asList("standalone", "tmp", "auth", "-")), new SecurityPermission("putProviderProperty.WildFlyElytron")), "permissions.xml");
    return jar;
}
Also used : JavaArchive(org.jboss.shrinkwrap.api.spec.JavaArchive) SecurityPermission(java.security.SecurityPermission) OperateOnDeployment(org.jboss.arquillian.container.test.api.OperateOnDeployment) Deployment(org.jboss.arquillian.container.test.api.Deployment) TargetsContainer(org.jboss.arquillian.container.test.api.TargetsContainer)

Example 23 with SecurityPermission

use of java.security.SecurityPermission in project guava by hceylan.

the class JSR166TestCase method runWithPermissions.

/**
 * Runs Runnable r with a security policy that permits precisely
 * the specified permissions.  If there is no current security
 * manager, the runnable is run twice, both with and without a
 * security manager.  We require that any security manager permit
 * getPolicy/setPolicy.
 */
public void runWithPermissions(Runnable r, Permission... permissions) {
    SecurityManager sm = System.getSecurityManager();
    if (sm == null) {
        r.run();
        Policy savedPolicy = Policy.getPolicy();
        try {
            Policy.setPolicy(permissivePolicy());
            System.setSecurityManager(new SecurityManager());
            runWithPermissions(r, permissions);
        } finally {
            System.setSecurityManager(null);
            Policy.setPolicy(savedPolicy);
        }
    } else {
        Policy savedPolicy = Policy.getPolicy();
        AdjustablePolicy policy = new AdjustablePolicy(permissions);
        Policy.setPolicy(policy);
        try {
            r.run();
        } finally {
            policy.addPermission(new SecurityPermission("setPolicy"));
            Policy.setPolicy(savedPolicy);
        }
    }
}
Also used : Policy(java.security.Policy) SecurityPermission(java.security.SecurityPermission)

Example 24 with SecurityPermission

use of java.security.SecurityPermission in project guava by google.

the class JSR166TestCase method runWithPermissions.

/**
 * Runs Runnable r with a security policy that permits precisely the specified permissions. If
 * there is no current security manager, the runnable is run twice, both with and without a
 * security manager. We require that any security manager permit getPolicy/setPolicy.
 */
public void runWithPermissions(Runnable r, Permission... permissions) {
    SecurityManager sm = System.getSecurityManager();
    if (sm == null) {
        r.run();
        Policy savedPolicy = Policy.getPolicy();
        try {
            Policy.setPolicy(permissivePolicy());
            System.setSecurityManager(new SecurityManager());
            runWithPermissions(r, permissions);
        } finally {
            System.setSecurityManager(null);
            Policy.setPolicy(savedPolicy);
        }
    } else {
        Policy savedPolicy = Policy.getPolicy();
        AdjustablePolicy policy = new AdjustablePolicy(permissions);
        Policy.setPolicy(policy);
        try {
            r.run();
        } finally {
            policy.addPermission(new SecurityPermission("setPolicy"));
            Policy.setPolicy(savedPolicy);
        }
    }
}
Also used : Policy(java.security.Policy) SecurityPermission(java.security.SecurityPermission)

Example 25 with SecurityPermission

use of java.security.SecurityPermission in project java-cloudant by cloudant.

the class LoggingTest method dnsWarningPermissionDenied.

/**
 * Test that a warning is logged if the DNS lifetime cannot be checked because of security
 * permissions.
 *
 * @throws Exception
 */
@Test
public void dnsWarningPermissionDenied(@Mocked final SecurityManager mockSecurityManager) throws Exception {
    // Record the mock expectations
    new Expectations() {

        {
            mockSecurityManager.checkPermission(new SecurityPermission("getProperty" + ".networkaddress.cache.ttl"));
            result = new SecurityException("Test exception to deny property access.");
            times = 1;
        }
    };
    logger = setupLogger(ClientBuilder.class, Level.WARNING);
    try {
        System.setSecurityManager(mockSecurityManager);
        CloudantClientHelper.getClientBuilder().build();
    } finally {
        // Unset the mock security manager
        System.setSecurityManager(null);
    }
    // Assert a warning was received
    assertEquals(1, handler.logEntries.size(), "There should be 1 log entry");
    // Assert that it matches the expected pattern
    assertLogMessage("Permission denied to check Java DNS cache TTL\\. .*", 0);
}
Also used : Expectations(mockit.Expectations) SecurityPermission(java.security.SecurityPermission) ClientBuilder(com.cloudant.client.api.ClientBuilder) Test(org.junit.jupiter.api.Test)

Aggregations

SecurityPermission (java.security.SecurityPermission)27 FilePermission (java.io.FilePermission)8 Deployment (org.jboss.arquillian.container.test.api.Deployment)8 WebArchive (org.jboss.shrinkwrap.api.spec.WebArchive)7 Policy (java.security.Policy)6 JavaArchive (org.jboss.shrinkwrap.api.spec.JavaArchive)6 PropertyPermission (java.util.PropertyPermission)5 OperateOnDeployment (org.jboss.arquillian.container.test.api.OperateOnDeployment)5 TargetsContainer (org.jboss.arquillian.container.test.api.TargetsContainer)5 SocketPermission (java.net.SocketPermission)4 AbstractClientInterceptorsSetupTask (org.jboss.as.test.shared.integration.interceptor.clientside.AbstractClientInterceptorsSetupTask)4 ReflectPermission (java.lang.reflect.ReflectPermission)3 Permission (java.security.Permission)3 PermissionCollection (java.security.PermissionCollection)3 Permissions (java.security.Permissions)3 StringAsset (org.jboss.shrinkwrap.api.asset.StringAsset)3 CodeSource (java.security.CodeSource)2 PrivilegedActionException (java.security.PrivilegedActionException)2 Expectations (mockit.Expectations)2 EnterpriseArchive (org.jboss.shrinkwrap.api.spec.EnterpriseArchive)2