glenn 2002/08/17 17:56:09 Modified: catalina/src/conf catalina.policy Log: Cleanup policy for release Revision Changes Path 1.25 +56 -56 jakarta-tomcat-4.0/catalina/src/conf/catalina.policy Index: catalina.policy =================================================================== RCS file: /home/cvs/jakarta-tomcat-4.0/catalina/src/conf/catalina.policy,v retrieving revision 1.24 retrieving revision 1.25 diff -u -r1.24 -r1.25 --- catalina.policy 19 Jul 2002 12:38:34 -0000 1.24 +++ catalina.policy 18 Aug 2002 00:56:09 -0000 1.25 @@ -17,23 +17,23 @@ // These permissions apply to javac grant codeBase "file:${java.home}/lib/-" { - permission java.security.AllPermission; + permission java.security.AllPermission; }; // These permissions apply to all shared system extensions grant codeBase "file:${java.home}/jre/lib/ext/-" { - permission java.security.AllPermission; + permission java.security.AllPermission; }; // These permissions apply to javac when ${java.home] points at $JAVA_HOME/jre grant codeBase "file:${java.home}/../lib/-" { - permission java.security.AllPermission; + permission java.security.AllPermission; }; // These permissions apply to all shared system extensions when // ${java.home} points at $JAVA_HOME/jre grant codeBase "file:${java.home}/lib/ext/-" { - permission java.security.AllPermission; + permission java.security.AllPermission; }; @@ -42,39 +42,39 @@ // These permissions apply to the server startup code grant codeBase "file:${catalina.home}/bin/bootstrap.jar" { - permission java.security.AllPermission; + permission java.security.AllPermission; }; // These permissions apply to the servlet API classes // and those that are shared across all class loaders // located in the "common" directory grant codeBase "file:${catalina.home}/common/-" { - permission java.security.AllPermission; + permission java.security.AllPermission; }; // These permissions apply to the container's core code, plus any additional // libraries installed in the "server" directory grant codeBase "file:${catalina.home}/server/-" { - permission java.security.AllPermission; + permission java.security.AllPermission; }; // These permissions apply to the jasper page compiler. grant codeBase "file:${catalina.home}/shared/lib/jasper-compiler.jar" { - permission java.security.AllPermission; + permission java.security.AllPermission; }; // These permissions apply to the jasper JSP runtime grant codeBase "file:${catalina.home}/shared/lib/jasper-runtime.jar" { - permission java.security.AllPermission; + permission java.security.AllPermission; }; // These permissions apply to the privileged admin and manager web applications grant codeBase "file:${catalina.home}/server/webapps/admin/WEB-INF/classes/-" { - permission java.security.AllPermission; + permission java.security.AllPermission; }; grant codeBase "file:${catalina.home}/server/webapps/admin/WEB-INF/lib/struts.jar" { - permission java.security.AllPermission; + permission java.security.AllPermission; }; // ========== WEB APPLICATION PERMISSIONS ===================================== @@ -84,47 +84,47 @@ // In addition, a web application will be given a read FilePermission // and JndiPermission for all files and directories in its document root. grant { - // Required for JNDI lookup of named JDBC DataSource's and - // javamail named MimePart DataSource used to send mail - permission java.util.PropertyPermission "java.home", "read"; - permission java.util.PropertyPermission "java.naming.*", "read"; - permission java.util.PropertyPermission "javax.sql.*", "read"; - - // OS Specific properties to allow read access - permission java.util.PropertyPermission "os.name", "read"; - permission java.util.PropertyPermission "os.version", "read"; - permission java.util.PropertyPermission "os.arch", "read"; - permission java.util.PropertyPermission "file.separator", "read"; - permission java.util.PropertyPermission "path.separator", "read"; - permission java.util.PropertyPermission "line.separator", "read"; - - // JVM properties to allow read access - permission java.util.PropertyPermission "java.version", "read"; - permission java.util.PropertyPermission "java.vendor", "read"; - permission java.util.PropertyPermission "java.vendor.url", "read"; - permission java.util.PropertyPermission "java.class.version", "read"; - permission java.util.PropertyPermission "java.specification.version", "read"; - permission java.util.PropertyPermission "java.specification.vendor", "read"; - permission java.util.PropertyPermission "java.specification.name", "read"; - - permission java.util.PropertyPermission "java.vm.specification.version", "read"; - permission java.util.PropertyPermission "java.vm.specification.vendor", "read"; - permission java.util.PropertyPermission "java.vm.specification.name", "read"; - permission java.util.PropertyPermission "java.vm.version", "read"; - permission java.util.PropertyPermission "java.vm.vendor", "read"; - permission java.util.PropertyPermission "java.vm.name", "read"; - - // Required for getting BeanInfo - permission java.lang.RuntimePermission "accessClassInPackage.sun.beans.*"; + // Required for JNDI lookup of named JDBC DataSource's and + // javamail named MimePart DataSource used to send mail + permission java.util.PropertyPermission "java.home", "read"; + permission java.util.PropertyPermission "java.naming.*", "read"; + permission java.util.PropertyPermission "javax.sql.*", "read"; + + // OS Specific properties to allow read access + permission java.util.PropertyPermission "os.name", "read"; + permission java.util.PropertyPermission "os.version", "read"; + permission java.util.PropertyPermission "os.arch", "read"; + permission java.util.PropertyPermission "file.separator", "read"; + permission java.util.PropertyPermission "path.separator", "read"; + permission java.util.PropertyPermission "line.separator", "read"; + + // JVM properties to allow read access + permission java.util.PropertyPermission "java.version", "read"; + permission java.util.PropertyPermission "java.vendor", "read"; + permission java.util.PropertyPermission "java.vendor.url", "read"; + permission java.util.PropertyPermission "java.class.version", "read"; + permission java.util.PropertyPermission "java.specification.version", "read"; + permission java.util.PropertyPermission "java.specification.vendor", "read"; + permission java.util.PropertyPermission "java.specification.name", "read"; + + permission java.util.PropertyPermission "java.vm.specification.version", "read"; + permission java.util.PropertyPermission "java.vm.specification.vendor", "read"; + permission java.util.PropertyPermission "java.vm.specification.name", "read"; + permission java.util.PropertyPermission "java.vm.version", "read"; + permission java.util.PropertyPermission "java.vm.vendor", "read"; + permission java.util.PropertyPermission "java.vm.name", "read"; + + // Required for getting BeanInfo + permission java.lang.RuntimePermission "accessClassInPackage.sun.beans.*"; - // Required for running servlets generated by JSPC - permission java.lang.RuntimePermission "accessClassInPackage.org.apache.jasper.runtime.*"; + // Required for running servlets generated by JSPC + permission java.lang.RuntimePermission "accessClassInPackage.org.apache.jasper.runtime.*"; - // Required for OpenJMX - permission java.lang.RuntimePermission "getAttribute"; + // Required for OpenJMX + permission java.lang.RuntimePermission "getAttribute"; - // Allow read of JAXP compliant XML parser debug - permission java.util.PropertyPermission "jaxp.debug", "read"; + // Allow read of JAXP compliant XML parser debug + permission java.util.PropertyPermission "jaxp.debug", "read"; }; @@ -143,8 +143,8 @@ // // The permissions granted to the context root directory apply to JSP pages. // grant codeBase "file:${catalina.home}/webapps/examples/-" { -// permission java.net.SocketPermission "dbhost.mycompany.com:5432", "connect"; -// permission java.net.SocketPermission "*.noaa.gov:80", "connect"; +// permission java.net.SocketPermission "dbhost.mycompany.com:5432", "connect"; +// permission java.net.SocketPermission "*.noaa.gov:80", "connect"; // }; // // The permissions granted to the context WEB-INF/classes directory @@ -152,11 +152,11 @@ // }; // // The permission granted to your JDBC driver -// grant codeBase "jar:file:${catalina.home}/webapps/examples/WEB-INF/lib/driver.jar!/-" { -// permission java.net.SocketPermission "dbhost.mycompany.com:5432", "connect"; +// grant codeBase "jar:file:${catalina.home}/webapps/examples/WEB-INF/lib/driver.jar" { +// permission java.net.SocketPermission "dbhost.mycompany.com:5432", "connect"; // }; // The permission granted to the scrape taglib -// grant codeBase "jar:file:${catalina.home}/webapps/examples/WEB-INF/lib/scrape.jar!/-" { -// permission java.net.SocketPermission "*.noaa.gov:80", "connect"; +// grant codeBase "jar:file:${catalina.home}/webapps/examples/WEB-INF/lib/scrape.jar" { +// permission java.net.SocketPermission "*.noaa.gov:80", "connect"; // };
-- To unsubscribe, e-mail: <mailto:[EMAIL PROTECTED]> For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>