1 |
771 |
jeremybenn |
/* SecurityManager.java -- security checks for privileged actions
|
2 |
|
|
Copyright (C) 1998, 1999, 2001, 2002, 2004, 2005 Free Software Foundation, Inc.
|
3 |
|
|
|
4 |
|
|
This file is part of GNU Classpath.
|
5 |
|
|
|
6 |
|
|
GNU Classpath is free software; you can redistribute it and/or modify
|
7 |
|
|
it under the terms of the GNU General Public License as published by
|
8 |
|
|
the Free Software Foundation; either version 2, or (at your option)
|
9 |
|
|
any later version.
|
10 |
|
|
|
11 |
|
|
GNU Classpath is distributed in the hope that it will be useful, but
|
12 |
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
13 |
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
14 |
|
|
General Public License for more details.
|
15 |
|
|
|
16 |
|
|
You should have received a copy of the GNU General Public License
|
17 |
|
|
along with GNU Classpath; see the file COPYING. If not, write to the
|
18 |
|
|
Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
19 |
|
|
02110-1301 USA.
|
20 |
|
|
|
21 |
|
|
Linking this library statically or dynamically with other modules is
|
22 |
|
|
making a combined work based on this library. Thus, the terms and
|
23 |
|
|
conditions of the GNU General Public License cover the whole
|
24 |
|
|
combination.
|
25 |
|
|
|
26 |
|
|
As a special exception, the copyright holders of this library give you
|
27 |
|
|
permission to link this library with independent modules to produce an
|
28 |
|
|
executable, regardless of the license terms of these independent
|
29 |
|
|
modules, and to copy and distribute the resulting executable under
|
30 |
|
|
terms of your choice, provided that you also meet, for each linked
|
31 |
|
|
independent module, the terms and conditions of the license of that
|
32 |
|
|
module. An independent module is a module which is not derived from
|
33 |
|
|
or based on this library. If you modify this library, you may extend
|
34 |
|
|
this exception to your version of the library, but you are not
|
35 |
|
|
obligated to do so. If you do not wish to do so, delete this
|
36 |
|
|
exception statement from your version. */
|
37 |
|
|
|
38 |
|
|
|
39 |
|
|
package java.lang;
|
40 |
|
|
|
41 |
|
|
import gnu.classpath.VMStackWalker;
|
42 |
|
|
|
43 |
|
|
import java.awt.AWTPermission;
|
44 |
|
|
import java.io.File;
|
45 |
|
|
import java.io.FileDescriptor;
|
46 |
|
|
import java.io.FileInputStream;
|
47 |
|
|
import java.io.FileOutputStream;
|
48 |
|
|
import java.io.FilePermission;
|
49 |
|
|
import java.io.RandomAccessFile;
|
50 |
|
|
import java.lang.reflect.Member;
|
51 |
|
|
import java.net.InetAddress;
|
52 |
|
|
import java.net.ServerSocket;
|
53 |
|
|
import java.net.Socket;
|
54 |
|
|
import java.net.SocketImplFactory;
|
55 |
|
|
import java.net.SocketPermission;
|
56 |
|
|
import java.net.URL;
|
57 |
|
|
import java.net.URLStreamHandlerFactory;
|
58 |
|
|
import java.security.AccessControlContext;
|
59 |
|
|
import java.security.AccessControlException;
|
60 |
|
|
import java.security.AccessController;
|
61 |
|
|
import java.security.AllPermission;
|
62 |
|
|
import java.security.BasicPermission;
|
63 |
|
|
import java.security.Permission;
|
64 |
|
|
import java.security.Policy;
|
65 |
|
|
import java.security.PrivilegedAction;
|
66 |
|
|
import java.security.ProtectionDomain;
|
67 |
|
|
import java.security.Security;
|
68 |
|
|
import java.security.SecurityPermission;
|
69 |
|
|
import java.util.Properties;
|
70 |
|
|
import java.util.PropertyPermission;
|
71 |
|
|
import java.util.StringTokenizer;
|
72 |
|
|
|
73 |
|
|
/**
|
74 |
|
|
* SecurityManager is a class you can extend to create your own Java
|
75 |
|
|
* security policy. By default, there is no SecurityManager installed in
|
76 |
|
|
* 1.1, which means that all things are permitted to all people. The security
|
77 |
|
|
* manager, if set, is consulted before doing anything with potentially
|
78 |
|
|
* dangerous results, and throws a <code>SecurityException</code> if the
|
79 |
|
|
* action is forbidden.
|
80 |
|
|
*
|
81 |
|
|
* <p>A typical check is as follows, just before the dangerous operation:<br>
|
82 |
|
|
* <pre>
|
83 |
|
|
* SecurityManager sm = System.getSecurityManager();
|
84 |
|
|
* if (sm != null)
|
85 |
|
|
* sm.checkABC(<em>argument</em>, ...);
|
86 |
|
|
* </pre>
|
87 |
|
|
* Note that this is thread-safe, by caching the security manager in a local
|
88 |
|
|
* variable rather than risking a NullPointerException if the mangager is
|
89 |
|
|
* changed between the check for null and before the permission check.
|
90 |
|
|
*
|
91 |
|
|
* <p>The special method <code>checkPermission</code> is a catchall, and
|
92 |
|
|
* the default implementation calls
|
93 |
|
|
* <code>AccessController.checkPermission</code>. In fact, all the other
|
94 |
|
|
* methods default to calling checkPermission.
|
95 |
|
|
*
|
96 |
|
|
* <p>Sometimes, the security check needs to happen from a different context,
|
97 |
|
|
* such as when called from a worker thread. In such cases, use
|
98 |
|
|
* <code>getSecurityContext</code> to take a snapshot that can be passed
|
99 |
|
|
* to the worker thread:<br>
|
100 |
|
|
* <pre>
|
101 |
|
|
* Object context = null;
|
102 |
|
|
* SecurityManager sm = System.getSecurityManager();
|
103 |
|
|
* if (sm != null)
|
104 |
|
|
* context = sm.getSecurityContext(); // defaults to an AccessControlContext
|
105 |
|
|
* // now, in worker thread
|
106 |
|
|
* if (sm != null)
|
107 |
|
|
* sm.checkPermission(permission, context);
|
108 |
|
|
* </pre>
|
109 |
|
|
*
|
110 |
|
|
* <p>Permissions fall into these categories: File, Socket, Net, Security,
|
111 |
|
|
* Runtime, Property, AWT, Reflect, and Serializable. Each of these
|
112 |
|
|
* permissions have a property naming convention, that follows a hierarchical
|
113 |
|
|
* naming convention, to make it easy to grant or deny several permissions
|
114 |
|
|
* at once. Some permissions also take a list of permitted actions, such
|
115 |
|
|
* as "read" or "write", to fine-tune control even more. The permission
|
116 |
|
|
* <code>java.security.AllPermission</code> grants all permissions.
|
117 |
|
|
*
|
118 |
|
|
* <p>The default methods in this class deny all things to all people. You
|
119 |
|
|
* must explicitly grant permission for anything you want to be legal when
|
120 |
|
|
* subclassing this class.
|
121 |
|
|
*
|
122 |
|
|
* @author John Keiser
|
123 |
|
|
* @author Eric Blake (ebb9@email.byu.edu)
|
124 |
|
|
* @see ClassLoader
|
125 |
|
|
* @see SecurityException
|
126 |
|
|
* @see #checkTopLevelWindow(Object)
|
127 |
|
|
* @see System#getSecurityManager()
|
128 |
|
|
* @see System#setSecurityManager(SecurityManager)
|
129 |
|
|
* @see AccessController
|
130 |
|
|
* @see AccessControlContext
|
131 |
|
|
* @see AccessControlException
|
132 |
|
|
* @see Permission
|
133 |
|
|
* @see BasicPermission
|
134 |
|
|
* @see java.io.FilePermission
|
135 |
|
|
* @see java.net.SocketPermission
|
136 |
|
|
* @see java.util.PropertyPermission
|
137 |
|
|
* @see RuntimePermission
|
138 |
|
|
* @see java.awt.AWTPermission
|
139 |
|
|
* @see Policy
|
140 |
|
|
* @see SecurityPermission
|
141 |
|
|
* @see ProtectionDomain
|
142 |
|
|
* @since 1.0
|
143 |
|
|
* @status still missing 1.4 functionality
|
144 |
|
|
*/
|
145 |
|
|
public class SecurityManager
|
146 |
|
|
{
|
147 |
|
|
/**
|
148 |
|
|
* The current security manager. This is located here instead of in
|
149 |
|
|
* System, to avoid security problems, as well as bootstrap issues.
|
150 |
|
|
* Make sure to access it in a thread-safe manner; it is package visible
|
151 |
|
|
* to avoid overhead in java.lang.
|
152 |
|
|
*/
|
153 |
|
|
static volatile SecurityManager current;
|
154 |
|
|
|
155 |
|
|
/**
|
156 |
|
|
* Tells whether or not the SecurityManager is currently performing a
|
157 |
|
|
* security check.
|
158 |
|
|
* @deprecated Use {@link #checkPermission(Permission)} instead.
|
159 |
|
|
*/
|
160 |
|
|
protected boolean inCheck;
|
161 |
|
|
|
162 |
|
|
/**
|
163 |
|
|
* Construct a new security manager. There may be a security check, of
|
164 |
|
|
* <code>RuntimePermission("createSecurityManager")</code>.
|
165 |
|
|
*
|
166 |
|
|
* @throws SecurityException if permission is denied
|
167 |
|
|
*/
|
168 |
|
|
public SecurityManager()
|
169 |
|
|
{
|
170 |
|
|
/* "When there is security manager installed, the security manager
|
171 |
|
|
need to check the package access. However, if the security
|
172 |
|
|
manager itself uses any unloaded class, it will trigger the
|
173 |
|
|
classloading, which causes infinite loop. There is no easy
|
174 |
|
|
legal solution. The workaround will be that security manager
|
175 |
|
|
can not depend on any unloaded class. In the constructor of
|
176 |
|
|
security manager, it must transitively load all classes it
|
177 |
|
|
refers to." Sun bug #4242924. */
|
178 |
|
|
|
179 |
|
|
// Load and initialize java.security.Security
|
180 |
|
|
java.security.Security.getProvider((String)null);
|
181 |
|
|
|
182 |
|
|
SecurityManager sm = System.getSecurityManager();
|
183 |
|
|
if (sm != null)
|
184 |
|
|
sm.checkPermission(new RuntimePermission("createSecurityManager"));
|
185 |
|
|
}
|
186 |
|
|
|
187 |
|
|
/**
|
188 |
|
|
* Tells whether or not the SecurityManager is currently performing a
|
189 |
|
|
* security check.
|
190 |
|
|
*
|
191 |
|
|
* @return true if the SecurityManager is in a security check
|
192 |
|
|
* @see #inCheck
|
193 |
|
|
* @deprecated use {@link #checkPermission(Permission)} instead
|
194 |
|
|
*/
|
195 |
|
|
public boolean getInCheck()
|
196 |
|
|
{
|
197 |
|
|
return inCheck;
|
198 |
|
|
}
|
199 |
|
|
|
200 |
|
|
/**
|
201 |
|
|
* Get a list of all the classes currently executing methods on the Java
|
202 |
|
|
* stack. getClassContext()[0] is the currently executing method (ie. the
|
203 |
|
|
* class that CALLED getClassContext, not SecurityManager).
|
204 |
|
|
*
|
205 |
|
|
* @return an array of classes on the Java execution stack
|
206 |
|
|
*/
|
207 |
|
|
protected Class[] getClassContext()
|
208 |
|
|
{
|
209 |
|
|
Class[] stack1 = VMStackWalker.getClassContext();
|
210 |
|
|
Class[] stack2 = new Class[stack1.length - 1];
|
211 |
|
|
System.arraycopy(stack1, 1, stack2, 0, stack1.length - 1);
|
212 |
|
|
return stack2;
|
213 |
|
|
}
|
214 |
|
|
|
215 |
|
|
/**
|
216 |
|
|
* Find the ClassLoader of the first non-system class on the execution
|
217 |
|
|
* stack. A non-system class is one whose ClassLoader is not equal to
|
218 |
|
|
* {@link ClassLoader#getSystemClassLoader()} or its ancestors. This
|
219 |
|
|
* will return null in three cases:
|
220 |
|
|
*
|
221 |
|
|
* <ul>
|
222 |
|
|
* <li>All methods on the stack are from system classes</li>
|
223 |
|
|
* <li>All methods on the stack up to the first "privileged" caller, as
|
224 |
|
|
* created by {@link AccessController#doPrivileged(PrivilegedAction)},
|
225 |
|
|
* are from system classes</li>
|
226 |
|
|
* <li>A check of <code>java.security.AllPermission</code> succeeds.</li>
|
227 |
|
|
* </ul>
|
228 |
|
|
*
|
229 |
|
|
* @return the most recent non-system ClassLoader on the execution stack
|
230 |
|
|
* @deprecated use {@link #checkPermission(Permission)} instead
|
231 |
|
|
*/
|
232 |
|
|
protected ClassLoader currentClassLoader()
|
233 |
|
|
{
|
234 |
|
|
Class cl = currentLoadedClass();
|
235 |
|
|
return cl != null ? cl.getClassLoader() : null;
|
236 |
|
|
}
|
237 |
|
|
|
238 |
|
|
/**
|
239 |
|
|
* Find the first non-system class on the execution stack. A non-system
|
240 |
|
|
* class is one whose ClassLoader is not equal to
|
241 |
|
|
* {@link ClassLoader#getSystemClassLoader()} or its ancestors. This
|
242 |
|
|
* will return null in three cases:
|
243 |
|
|
*
|
244 |
|
|
* <ul>
|
245 |
|
|
* <li>All methods on the stack are from system classes</li>
|
246 |
|
|
* <li>All methods on the stack up to the first "privileged" caller, as
|
247 |
|
|
* created by {@link AccessController#doPrivileged(PrivilegedAction)},
|
248 |
|
|
* are from system classes</li>
|
249 |
|
|
* <li>A check of <code>java.security.AllPermission</code> succeeds.</li>
|
250 |
|
|
* </ul>
|
251 |
|
|
*
|
252 |
|
|
* @return the most recent non-system Class on the execution stack
|
253 |
|
|
* @deprecated use {@link #checkPermission(Permission)} instead
|
254 |
|
|
*/
|
255 |
|
|
protected Class<?> currentLoadedClass()
|
256 |
|
|
{
|
257 |
|
|
int i = classLoaderDepth();
|
258 |
|
|
return i >= 0 ? getClassContext()[i] : null;
|
259 |
|
|
}
|
260 |
|
|
|
261 |
|
|
/**
|
262 |
|
|
* Get the depth of a particular class on the execution stack.
|
263 |
|
|
*
|
264 |
|
|
* @param className the fully-qualified name to search for
|
265 |
|
|
* @return the index of the class on the stack, or -1
|
266 |
|
|
* @deprecated use {@link #checkPermission(Permission)} instead
|
267 |
|
|
*/
|
268 |
|
|
protected int classDepth(String className)
|
269 |
|
|
{
|
270 |
|
|
Class[] c = getClassContext();
|
271 |
|
|
for (int i = 0; i < c.length; i++)
|
272 |
|
|
if (className.equals(c[i].getName()))
|
273 |
|
|
return i;
|
274 |
|
|
return -1;
|
275 |
|
|
}
|
276 |
|
|
|
277 |
|
|
/**
|
278 |
|
|
* Get the depth on the execution stack of the most recent non-system class.
|
279 |
|
|
* A non-system class is one whose ClassLoader is not equal to
|
280 |
|
|
* {@link ClassLoader#getSystemClassLoader()} or its ancestors. This
|
281 |
|
|
* will return -1 in three cases:
|
282 |
|
|
*
|
283 |
|
|
* <ul>
|
284 |
|
|
* <li>All methods on the stack are from system classes</li>
|
285 |
|
|
* <li>All methods on the stack up to the first "privileged" caller, as
|
286 |
|
|
* created by {@link AccessController#doPrivileged(PrivilegedAction)},
|
287 |
|
|
* are from system classes</li>
|
288 |
|
|
* <li>A check of <code>java.security.AllPermission</code> succeeds.</li>
|
289 |
|
|
* </ul>
|
290 |
|
|
*
|
291 |
|
|
* @return the index of the most recent non-system Class on the stack
|
292 |
|
|
* @deprecated use {@link #checkPermission(Permission)} instead
|
293 |
|
|
*/
|
294 |
|
|
protected int classLoaderDepth()
|
295 |
|
|
{
|
296 |
|
|
try
|
297 |
|
|
{
|
298 |
|
|
checkPermission(new AllPermission());
|
299 |
|
|
}
|
300 |
|
|
catch (SecurityException e)
|
301 |
|
|
{
|
302 |
|
|
Class[] c = getClassContext();
|
303 |
|
|
for (int i = 0; i < c.length; i++)
|
304 |
|
|
if (c[i].getClassLoader() != null)
|
305 |
|
|
// XXX Check if c[i] is AccessController, or a system class.
|
306 |
|
|
return i;
|
307 |
|
|
}
|
308 |
|
|
return -1;
|
309 |
|
|
}
|
310 |
|
|
|
311 |
|
|
/**
|
312 |
|
|
* Tell whether the specified class is on the execution stack.
|
313 |
|
|
*
|
314 |
|
|
* @param className the fully-qualified name of the class to find
|
315 |
|
|
* @return whether the specified class is on the execution stack
|
316 |
|
|
* @deprecated use {@link #checkPermission(Permission)} instead
|
317 |
|
|
*/
|
318 |
|
|
protected boolean inClass(String className)
|
319 |
|
|
{
|
320 |
|
|
return classDepth(className) != -1;
|
321 |
|
|
}
|
322 |
|
|
|
323 |
|
|
/**
|
324 |
|
|
* Tell whether there is a class loaded with an explicit ClassLoader on
|
325 |
|
|
* the stack.
|
326 |
|
|
*
|
327 |
|
|
* @return whether a class with an explicit ClassLoader is on the stack
|
328 |
|
|
* @deprecated use {@link #checkPermission(Permission)} instead
|
329 |
|
|
*/
|
330 |
|
|
protected boolean inClassLoader()
|
331 |
|
|
{
|
332 |
|
|
return classLoaderDepth() != -1;
|
333 |
|
|
}
|
334 |
|
|
|
335 |
|
|
/**
|
336 |
|
|
* Get an implementation-dependent Object that contains enough information
|
337 |
|
|
* about the current environment to be able to perform standard security
|
338 |
|
|
* checks later. This is used by trusted methods that need to verify that
|
339 |
|
|
* their callers have sufficient access to perform certain operations.
|
340 |
|
|
*
|
341 |
|
|
* <p>Currently the only methods that use this are checkRead() and
|
342 |
|
|
* checkConnect(). The default implementation returns an
|
343 |
|
|
* <code>AccessControlContext</code>.
|
344 |
|
|
*
|
345 |
|
|
* @return a security context
|
346 |
|
|
* @see #checkConnect(String, int, Object)
|
347 |
|
|
* @see #checkRead(String, Object)
|
348 |
|
|
* @see AccessControlContext
|
349 |
|
|
* @see AccessController#getContext()
|
350 |
|
|
*/
|
351 |
|
|
public Object getSecurityContext()
|
352 |
|
|
{
|
353 |
|
|
return AccessController.getContext();
|
354 |
|
|
}
|
355 |
|
|
|
356 |
|
|
/**
|
357 |
|
|
* Check if the current thread is allowed to perform an operation that
|
358 |
|
|
* requires the specified <code>Permission</code>. This defaults to
|
359 |
|
|
* <code>AccessController.checkPermission</code>.
|
360 |
|
|
*
|
361 |
|
|
* @param perm the <code>Permission</code> required
|
362 |
|
|
* @throws SecurityException if permission is denied
|
363 |
|
|
* @throws NullPointerException if perm is null
|
364 |
|
|
* @since 1.2
|
365 |
|
|
*/
|
366 |
|
|
public void checkPermission(Permission perm)
|
367 |
|
|
{
|
368 |
|
|
AccessController.checkPermission(perm);
|
369 |
|
|
}
|
370 |
|
|
|
371 |
|
|
/**
|
372 |
|
|
* Check if the current thread is allowed to perform an operation that
|
373 |
|
|
* requires the specified <code>Permission</code>. This is done in a
|
374 |
|
|
* context previously returned by <code>getSecurityContext()</code>. The
|
375 |
|
|
* default implementation expects context to be an AccessControlContext,
|
376 |
|
|
* and it calls <code>AccessControlContext.checkPermission(perm)</code>.
|
377 |
|
|
*
|
378 |
|
|
* @param perm the <code>Permission</code> required
|
379 |
|
|
* @param context a security context
|
380 |
|
|
* @throws SecurityException if permission is denied, or if context is
|
381 |
|
|
* not an AccessControlContext
|
382 |
|
|
* @throws NullPointerException if perm is null
|
383 |
|
|
* @see #getSecurityContext()
|
384 |
|
|
* @see AccessControlContext#checkPermission(Permission)
|
385 |
|
|
* @since 1.2
|
386 |
|
|
*/
|
387 |
|
|
public void checkPermission(Permission perm, Object context)
|
388 |
|
|
{
|
389 |
|
|
if (! (context instanceof AccessControlContext))
|
390 |
|
|
throw new SecurityException("Missing context");
|
391 |
|
|
((AccessControlContext) context).checkPermission(perm);
|
392 |
|
|
}
|
393 |
|
|
|
394 |
|
|
/**
|
395 |
|
|
* Check if the current thread is allowed to create a ClassLoader. This
|
396 |
|
|
* method is called from ClassLoader.ClassLoader(), and checks
|
397 |
|
|
* <code>RuntimePermission("createClassLoader")</code>. If you override
|
398 |
|
|
* this, you should call <code>super.checkCreateClassLoader()</code> rather
|
399 |
|
|
* than throwing an exception.
|
400 |
|
|
*
|
401 |
|
|
* @throws SecurityException if permission is denied
|
402 |
|
|
* @see ClassLoader#ClassLoader()
|
403 |
|
|
*/
|
404 |
|
|
public void checkCreateClassLoader()
|
405 |
|
|
{
|
406 |
|
|
checkPermission(new RuntimePermission("createClassLoader"));
|
407 |
|
|
}
|
408 |
|
|
|
409 |
|
|
/**
|
410 |
|
|
* Check if the current thread is allowed to modify another Thread. This is
|
411 |
|
|
* called by Thread.stop(), suspend(), resume(), interrupt(), destroy(),
|
412 |
|
|
* setPriority(), setName(), and setDaemon(). The default implementation
|
413 |
|
|
* checks <code>RuntimePermission("modifyThread")</code> on system threads
|
414 |
|
|
* (ie. threads in ThreadGroup with a null parent), and returns silently on
|
415 |
|
|
* other threads.
|
416 |
|
|
*
|
417 |
|
|
* <p>If you override this, you must do two things. First, call
|
418 |
|
|
* <code>super.checkAccess(t)</code>, to make sure you are not relaxing
|
419 |
|
|
* requirements. Second, if the calling thread has
|
420 |
|
|
* <code>RuntimePermission("modifyThread")</code>, return silently, so that
|
421 |
|
|
* core classes (the Classpath library!) can modify any thread.
|
422 |
|
|
*
|
423 |
|
|
* @param thread the other Thread to check
|
424 |
|
|
* @throws SecurityException if permission is denied
|
425 |
|
|
* @throws NullPointerException if thread is null
|
426 |
|
|
* @see Thread#stop()
|
427 |
|
|
* @see Thread#suspend()
|
428 |
|
|
* @see Thread#resume()
|
429 |
|
|
* @see Thread#setPriority(int)
|
430 |
|
|
* @see Thread#setName(String)
|
431 |
|
|
* @see Thread#setDaemon(boolean)
|
432 |
|
|
*/
|
433 |
|
|
public void checkAccess(Thread thread)
|
434 |
|
|
{
|
435 |
|
|
if (thread.getThreadGroup() != null
|
436 |
|
|
&& thread.getThreadGroup().parent == null)
|
437 |
|
|
checkPermission(new RuntimePermission("modifyThread"));
|
438 |
|
|
}
|
439 |
|
|
|
440 |
|
|
/**
|
441 |
|
|
* Check if the current thread is allowed to modify a ThreadGroup. This is
|
442 |
|
|
* called by Thread.Thread() (to add a thread to the ThreadGroup),
|
443 |
|
|
* ThreadGroup.ThreadGroup() (to add this ThreadGroup to a parent),
|
444 |
|
|
* ThreadGroup.stop(), suspend(), resume(), interrupt(), destroy(),
|
445 |
|
|
* setDaemon(), and setMaxPriority(). The default implementation
|
446 |
|
|
* checks <code>RuntimePermission("modifyThread")</code> on the system group
|
447 |
|
|
* (ie. the one with a null parent), and returns silently on other groups.
|
448 |
|
|
*
|
449 |
|
|
* <p>If you override this, you must do two things. First, call
|
450 |
|
|
* <code>super.checkAccess(t)</code>, to make sure you are not relaxing
|
451 |
|
|
* requirements. Second, if the calling thread has
|
452 |
|
|
* <code>RuntimePermission("modifyThreadGroup")</code>, return silently,
|
453 |
|
|
* so that core classes (the Classpath library!) can modify any thread.
|
454 |
|
|
*
|
455 |
|
|
* @param g the ThreadGroup to check
|
456 |
|
|
* @throws SecurityException if permission is denied
|
457 |
|
|
* @throws NullPointerException if g is null
|
458 |
|
|
* @see Thread#Thread()
|
459 |
|
|
* @see ThreadGroup#ThreadGroup(String)
|
460 |
|
|
* @see ThreadGroup#stop()
|
461 |
|
|
* @see ThreadGroup#suspend()
|
462 |
|
|
* @see ThreadGroup#resume()
|
463 |
|
|
* @see ThreadGroup#interrupt()
|
464 |
|
|
* @see ThreadGroup#setDaemon(boolean)
|
465 |
|
|
* @see ThreadGroup#setMaxPriority(int)
|
466 |
|
|
*/
|
467 |
|
|
public void checkAccess(ThreadGroup g)
|
468 |
|
|
{
|
469 |
|
|
if (g.parent == null)
|
470 |
|
|
checkPermission(new RuntimePermission("modifyThreadGroup"));
|
471 |
|
|
}
|
472 |
|
|
|
473 |
|
|
/**
|
474 |
|
|
* Check if the current thread is allowed to exit the JVM with the given
|
475 |
|
|
* status. This method is called from Runtime.exit() and Runtime.halt().
|
476 |
|
|
* The default implementation checks
|
477 |
|
|
* <code>RuntimePermission("exitVM")</code>. If you override this, call
|
478 |
|
|
* <code>super.checkExit</code> rather than throwing an exception.
|
479 |
|
|
*
|
480 |
|
|
* @param status the status to exit with
|
481 |
|
|
* @throws SecurityException if permission is denied
|
482 |
|
|
* @see Runtime#exit(int)
|
483 |
|
|
* @see Runtime#halt(int)
|
484 |
|
|
*/
|
485 |
|
|
public void checkExit(int status)
|
486 |
|
|
{
|
487 |
|
|
checkPermission(new RuntimePermission("exitVM"));
|
488 |
|
|
}
|
489 |
|
|
|
490 |
|
|
/**
|
491 |
|
|
* Check if the current thread is allowed to execute the given program. This
|
492 |
|
|
* method is called from Runtime.exec(). If the name is an absolute path,
|
493 |
|
|
* the default implementation checks
|
494 |
|
|
* <code>FilePermission(program, "execute")</code>, otherwise it checks
|
495 |
|
|
* <code>FilePermission("<<ALL FILES>>", "execute")</code>. If
|
496 |
|
|
* you override this, call <code>super.checkExec</code> rather than
|
497 |
|
|
* throwing an exception.
|
498 |
|
|
*
|
499 |
|
|
* @param program the name of the program to exec
|
500 |
|
|
* @throws SecurityException if permission is denied
|
501 |
|
|
* @throws NullPointerException if program is null
|
502 |
|
|
* @see Runtime#exec(String[], String[], File)
|
503 |
|
|
*/
|
504 |
|
|
public void checkExec(String program)
|
505 |
|
|
{
|
506 |
|
|
if (! program.equals(new File(program).getAbsolutePath()))
|
507 |
|
|
program = "<<ALL FILES>>";
|
508 |
|
|
checkPermission(new FilePermission(program, "execute"));
|
509 |
|
|
}
|
510 |
|
|
|
511 |
|
|
/**
|
512 |
|
|
* Check if the current thread is allowed to link in the given native
|
513 |
|
|
* library. This method is called from Runtime.load() (and hence, by
|
514 |
|
|
* loadLibrary() as well). The default implementation checks
|
515 |
|
|
* <code>RuntimePermission("loadLibrary." + filename)</code>. If you
|
516 |
|
|
* override this, call <code>super.checkLink</code> rather than throwing
|
517 |
|
|
* an exception.
|
518 |
|
|
*
|
519 |
|
|
* @param filename the full name of the library to load
|
520 |
|
|
* @throws SecurityException if permission is denied
|
521 |
|
|
* @throws NullPointerException if filename is null
|
522 |
|
|
* @see Runtime#load(String)
|
523 |
|
|
*/
|
524 |
|
|
public void checkLink(String filename)
|
525 |
|
|
{
|
526 |
|
|
// Use the toString() hack to do the null check.
|
527 |
|
|
checkPermission(new RuntimePermission("loadLibrary."
|
528 |
|
|
+ filename.toString()));
|
529 |
|
|
}
|
530 |
|
|
|
531 |
|
|
/**
|
532 |
|
|
* Check if the current thread is allowed to read the given file using the
|
533 |
|
|
* FileDescriptor. This method is called from
|
534 |
|
|
* FileInputStream.FileInputStream(). The default implementation checks
|
535 |
|
|
* <code>RuntimePermission("readFileDescriptor")</code>. If you override
|
536 |
|
|
* this, call <code>super.checkRead</code> rather than throwing an
|
537 |
|
|
* exception.
|
538 |
|
|
*
|
539 |
|
|
* @param desc the FileDescriptor representing the file to access
|
540 |
|
|
* @throws SecurityException if permission is denied
|
541 |
|
|
* @throws NullPointerException if desc is null
|
542 |
|
|
* @see FileInputStream#FileInputStream(FileDescriptor)
|
543 |
|
|
*/
|
544 |
|
|
public void checkRead(FileDescriptor desc)
|
545 |
|
|
{
|
546 |
|
|
if (desc == null)
|
547 |
|
|
throw new NullPointerException();
|
548 |
|
|
checkPermission(new RuntimePermission("readFileDescriptor"));
|
549 |
|
|
}
|
550 |
|
|
|
551 |
|
|
/**
|
552 |
|
|
* Check if the current thread is allowed to read the given file. This
|
553 |
|
|
* method is called from FileInputStream.FileInputStream(),
|
554 |
|
|
* RandomAccessFile.RandomAccessFile(), File.exists(), canRead(), isFile(),
|
555 |
|
|
* isDirectory(), lastModified(), length() and list(). The default
|
556 |
|
|
* implementation checks <code>FilePermission(filename, "read")</code>. If
|
557 |
|
|
* you override this, call <code>super.checkRead</code> rather than
|
558 |
|
|
* throwing an exception.
|
559 |
|
|
*
|
560 |
|
|
* @param filename the full name of the file to access
|
561 |
|
|
* @throws SecurityException if permission is denied
|
562 |
|
|
* @throws NullPointerException if filename is null
|
563 |
|
|
* @see File
|
564 |
|
|
* @see FileInputStream#FileInputStream(String)
|
565 |
|
|
* @see RandomAccessFile#RandomAccessFile(String, String)
|
566 |
|
|
*/
|
567 |
|
|
public void checkRead(String filename)
|
568 |
|
|
{
|
569 |
|
|
checkPermission(new FilePermission(filename, "read"));
|
570 |
|
|
}
|
571 |
|
|
|
572 |
|
|
/**
|
573 |
|
|
* Check if the current thread is allowed to read the given file. using the
|
574 |
|
|
* given security context. The context must be a result of a previous call
|
575 |
|
|
* to <code>getSecurityContext()</code>. The default implementation checks
|
576 |
|
|
* <code>AccessControlContext.checkPermission(new FilePermission(filename,
|
577 |
|
|
* "read"))</code>. If you override this, call <code>super.checkRead</code>
|
578 |
|
|
* rather than throwing an exception.
|
579 |
|
|
*
|
580 |
|
|
* @param filename the full name of the file to access
|
581 |
|
|
* @param context the context to determine access for
|
582 |
|
|
* @throws SecurityException if permission is denied, or if context is
|
583 |
|
|
* not an AccessControlContext
|
584 |
|
|
* @throws NullPointerException if filename is null
|
585 |
|
|
* @see #getSecurityContext()
|
586 |
|
|
* @see AccessControlContext#checkPermission(Permission)
|
587 |
|
|
*/
|
588 |
|
|
public void checkRead(String filename, Object context)
|
589 |
|
|
{
|
590 |
|
|
if (! (context instanceof AccessControlContext))
|
591 |
|
|
throw new SecurityException("Missing context");
|
592 |
|
|
AccessControlContext ac = (AccessControlContext) context;
|
593 |
|
|
ac.checkPermission(new FilePermission(filename, "read"));
|
594 |
|
|
}
|
595 |
|
|
|
596 |
|
|
/**
|
597 |
|
|
* Check if the current thread is allowed to write the given file using the
|
598 |
|
|
* FileDescriptor. This method is called from
|
599 |
|
|
* FileOutputStream.FileOutputStream(). The default implementation checks
|
600 |
|
|
* <code>RuntimePermission("writeFileDescriptor")</code>. If you override
|
601 |
|
|
* this, call <code>super.checkWrite</code> rather than throwing an
|
602 |
|
|
* exception.
|
603 |
|
|
*
|
604 |
|
|
* @param desc the FileDescriptor representing the file to access
|
605 |
|
|
* @throws SecurityException if permission is denied
|
606 |
|
|
* @throws NullPointerException if desc is null
|
607 |
|
|
* @see FileOutputStream#FileOutputStream(FileDescriptor)
|
608 |
|
|
*/
|
609 |
|
|
public void checkWrite(FileDescriptor desc)
|
610 |
|
|
{
|
611 |
|
|
if (desc == null)
|
612 |
|
|
throw new NullPointerException();
|
613 |
|
|
checkPermission(new RuntimePermission("writeFileDescriptor"));
|
614 |
|
|
}
|
615 |
|
|
|
616 |
|
|
/**
|
617 |
|
|
* Check if the current thread is allowed to write the given file. This
|
618 |
|
|
* method is called from FileOutputStream.FileOutputStream(),
|
619 |
|
|
* RandomAccessFile.RandomAccessFile(), File.canWrite(), mkdir(), and
|
620 |
|
|
* renameTo(). The default implementation checks
|
621 |
|
|
* <code>FilePermission(filename, "write")</code>. If you override this,
|
622 |
|
|
* call <code>super.checkWrite</code> rather than throwing an exception.
|
623 |
|
|
*
|
624 |
|
|
* @param filename the full name of the file to access
|
625 |
|
|
* @throws SecurityException if permission is denied
|
626 |
|
|
* @throws NullPointerException if filename is null
|
627 |
|
|
* @see File
|
628 |
|
|
* @see File#canWrite()
|
629 |
|
|
* @see File#mkdir()
|
630 |
|
|
* @see File#renameTo(File)
|
631 |
|
|
* @see FileOutputStream#FileOutputStream(String)
|
632 |
|
|
* @see RandomAccessFile#RandomAccessFile(String, String)
|
633 |
|
|
*/
|
634 |
|
|
public void checkWrite(String filename)
|
635 |
|
|
{
|
636 |
|
|
checkPermission(new FilePermission(filename, "write"));
|
637 |
|
|
}
|
638 |
|
|
|
639 |
|
|
/**
|
640 |
|
|
* Check if the current thread is allowed to delete the given file. This
|
641 |
|
|
* method is called from File.delete(). The default implementation checks
|
642 |
|
|
* <code>FilePermission(filename, "delete")</code>. If you override this,
|
643 |
|
|
* call <code>super.checkDelete</code> rather than throwing an exception.
|
644 |
|
|
*
|
645 |
|
|
* @param filename the full name of the file to delete
|
646 |
|
|
* @throws SecurityException if permission is denied
|
647 |
|
|
* @throws NullPointerException if filename is null
|
648 |
|
|
* @see File#delete()
|
649 |
|
|
*/
|
650 |
|
|
public void checkDelete(String filename)
|
651 |
|
|
{
|
652 |
|
|
checkPermission(new FilePermission(filename, "delete"));
|
653 |
|
|
}
|
654 |
|
|
|
655 |
|
|
/**
|
656 |
|
|
* Check if the current thread is allowed to connect to a given host on a
|
657 |
|
|
* given port. This method is called from Socket.Socket(). A port number
|
658 |
|
|
* of -1 indicates the caller is attempting to determine an IP address, so
|
659 |
|
|
* the default implementation checks
|
660 |
|
|
* <code>SocketPermission(host, "resolve")</code>. Otherwise, the default
|
661 |
|
|
* implementation checks
|
662 |
|
|
* <code>SocketPermission(host + ":" + port, "connect")</code>. If you
|
663 |
|
|
* override this, call <code>super.checkConnect</code> rather than throwing
|
664 |
|
|
* an exception.
|
665 |
|
|
*
|
666 |
|
|
* @param host the host to connect to
|
667 |
|
|
* @param port the port to connect on
|
668 |
|
|
* @throws SecurityException if permission is denied
|
669 |
|
|
* @throws NullPointerException if host is null
|
670 |
|
|
* @see Socket#Socket()
|
671 |
|
|
*/
|
672 |
|
|
public void checkConnect(String host, int port)
|
673 |
|
|
{
|
674 |
|
|
if (port == -1)
|
675 |
|
|
checkPermission(new SocketPermission(host, "resolve"));
|
676 |
|
|
else
|
677 |
|
|
// Use the toString() hack to do the null check.
|
678 |
|
|
checkPermission(new SocketPermission(host.toString() + ":" + port,
|
679 |
|
|
"connect"));
|
680 |
|
|
}
|
681 |
|
|
|
682 |
|
|
/**
|
683 |
|
|
* Check if the current thread is allowed to connect to a given host on a
|
684 |
|
|
* given port, using the given security context. The context must be a
|
685 |
|
|
* result of a previous call to <code>getSecurityContext</code>. A port
|
686 |
|
|
* number of -1 indicates the caller is attempting to determine an IP
|
687 |
|
|
* address, so the default implementation checks
|
688 |
|
|
* <code>AccessControlContext.checkPermission(new SocketPermission(host,
|
689 |
|
|
* "resolve"))</code>. Otherwise, the default implementation checks
|
690 |
|
|
* <code>AccessControlContext.checkPermission(new SocketPermission(host
|
691 |
|
|
* + ":" + port, "connect"))</code>. If you override this, call
|
692 |
|
|
* <code>super.checkConnect</code> rather than throwing an exception.
|
693 |
|
|
*
|
694 |
|
|
* @param host the host to connect to
|
695 |
|
|
* @param port the port to connect on
|
696 |
|
|
* @param context the context to determine access for
|
697 |
|
|
*
|
698 |
|
|
* @throws SecurityException if permission is denied, or if context is
|
699 |
|
|
* not an AccessControlContext
|
700 |
|
|
* @throws NullPointerException if host is null
|
701 |
|
|
*
|
702 |
|
|
* @see #getSecurityContext()
|
703 |
|
|
* @see AccessControlContext#checkPermission(Permission)
|
704 |
|
|
*/
|
705 |
|
|
public void checkConnect(String host, int port, Object context)
|
706 |
|
|
{
|
707 |
|
|
if (! (context instanceof AccessControlContext))
|
708 |
|
|
throw new SecurityException("Missing context");
|
709 |
|
|
AccessControlContext ac = (AccessControlContext) context;
|
710 |
|
|
if (port == -1)
|
711 |
|
|
ac.checkPermission(new SocketPermission(host, "resolve"));
|
712 |
|
|
else
|
713 |
|
|
// Use the toString() hack to do the null check.
|
714 |
|
|
ac.checkPermission(new SocketPermission(host.toString() + ":" + port,
|
715 |
|
|
"connect"));
|
716 |
|
|
}
|
717 |
|
|
|
718 |
|
|
/**
|
719 |
|
|
* Check if the current thread is allowed to listen to a specific port for
|
720 |
|
|
* data. This method is called by ServerSocket.ServerSocket(). The default
|
721 |
|
|
* implementation checks
|
722 |
|
|
* <code>SocketPermission("localhost:" + (port == 0 ? "1024-" : "" + port),
|
723 |
|
|
* "listen")</code>. If you override this, call
|
724 |
|
|
* <code>super.checkListen</code> rather than throwing an exception.
|
725 |
|
|
*
|
726 |
|
|
* @param port the port to listen on
|
727 |
|
|
* @throws SecurityException if permission is denied
|
728 |
|
|
* @see ServerSocket#ServerSocket(int)
|
729 |
|
|
*/
|
730 |
|
|
public void checkListen(int port)
|
731 |
|
|
{
|
732 |
|
|
checkPermission(new SocketPermission("localhost:"
|
733 |
|
|
+ (port == 0 ? "1024-" : "" +port),
|
734 |
|
|
"listen"));
|
735 |
|
|
}
|
736 |
|
|
|
737 |
|
|
/**
|
738 |
|
|
* Check if the current thread is allowed to accept a connection from a
|
739 |
|
|
* particular host on a particular port. This method is called by
|
740 |
|
|
* ServerSocket.implAccept(). The default implementation checks
|
741 |
|
|
* <code>SocketPermission(host + ":" + port, "accept")</code>. If you
|
742 |
|
|
* override this, call <code>super.checkAccept</code> rather than throwing
|
743 |
|
|
* an exception.
|
744 |
|
|
*
|
745 |
|
|
* @param host the host which wishes to connect
|
746 |
|
|
* @param port the port the connection will be on
|
747 |
|
|
* @throws SecurityException if permission is denied
|
748 |
|
|
* @throws NullPointerException if host is null
|
749 |
|
|
* @see ServerSocket#accept()
|
750 |
|
|
*/
|
751 |
|
|
public void checkAccept(String host, int port)
|
752 |
|
|
{
|
753 |
|
|
// Use the toString() hack to do the null check.
|
754 |
|
|
checkPermission(new SocketPermission(host.toString() + ":" + port,
|
755 |
|
|
"accept"));
|
756 |
|
|
}
|
757 |
|
|
|
758 |
|
|
/**
|
759 |
|
|
* Check if the current thread is allowed to read and write multicast to
|
760 |
|
|
* a particular address. The default implementation checks
|
761 |
|
|
* <code>SocketPermission(addr.getHostAddress(), "accept,connect")</code>.
|
762 |
|
|
* If you override this, call <code>super.checkMulticast</code> rather than
|
763 |
|
|
* throwing an exception.
|
764 |
|
|
*
|
765 |
|
|
* @param addr the address to multicast to
|
766 |
|
|
* @throws SecurityException if permission is denied
|
767 |
|
|
* @throws NullPointerException if host is null
|
768 |
|
|
* @since 1.1
|
769 |
|
|
*/
|
770 |
|
|
public void checkMulticast(InetAddress addr)
|
771 |
|
|
{
|
772 |
|
|
checkPermission(new SocketPermission(addr.getHostAddress(),
|
773 |
|
|
"accept,connect"));
|
774 |
|
|
}
|
775 |
|
|
|
776 |
|
|
/**
|
777 |
|
|
*Check if the current thread is allowed to read and write multicast to
|
778 |
|
|
* a particular address with a particular ttl (time-to-live) value. The
|
779 |
|
|
* default implementation ignores ttl, and checks
|
780 |
|
|
* <code>SocketPermission(addr.getHostAddress(), "accept,connect")</code>.
|
781 |
|
|
* If you override this, call <code>super.checkMulticast</code> rather than
|
782 |
|
|
* throwing an exception.
|
783 |
|
|
*
|
784 |
|
|
* @param addr the address to multicast to
|
785 |
|
|
* @param ttl value in use for multicast send
|
786 |
|
|
* @throws SecurityException if permission is denied
|
787 |
|
|
* @throws NullPointerException if host is null
|
788 |
|
|
* @since 1.1
|
789 |
|
|
* @deprecated use {@link #checkPermission(Permission)} instead
|
790 |
|
|
*/
|
791 |
|
|
public void checkMulticast(InetAddress addr, byte ttl)
|
792 |
|
|
{
|
793 |
|
|
checkPermission(new SocketPermission(addr.getHostAddress(),
|
794 |
|
|
"accept,connect"));
|
795 |
|
|
}
|
796 |
|
|
|
797 |
|
|
/**
|
798 |
|
|
* Check if the current thread is allowed to read or write all the system
|
799 |
|
|
* properties at once. This method is called by System.getProperties()
|
800 |
|
|
* and setProperties(). The default implementation checks
|
801 |
|
|
* <code>PropertyPermission("*", "read,write")</code>. If you override
|
802 |
|
|
* this, call <code>super.checkPropertiesAccess</code> rather than
|
803 |
|
|
* throwing an exception.
|
804 |
|
|
*
|
805 |
|
|
* @throws SecurityException if permission is denied
|
806 |
|
|
* @see System#getProperties()
|
807 |
|
|
* @see System#setProperties(Properties)
|
808 |
|
|
*/
|
809 |
|
|
public void checkPropertiesAccess()
|
810 |
|
|
{
|
811 |
|
|
checkPermission(new PropertyPermission("*", "read,write"));
|
812 |
|
|
}
|
813 |
|
|
|
814 |
|
|
/**
|
815 |
|
|
* Check if the current thread is allowed to read a particular system
|
816 |
|
|
* property (writes are checked directly via checkPermission). This method
|
817 |
|
|
* is called by System.getProperty() and setProperty(). The default
|
818 |
|
|
* implementation checks <code>PropertyPermission(key, "read")</code>. If
|
819 |
|
|
* you override this, call <code>super.checkPropertyAccess</code> rather
|
820 |
|
|
* than throwing an exception.
|
821 |
|
|
*
|
822 |
|
|
* @param key the key of the property to check
|
823 |
|
|
*
|
824 |
|
|
* @throws SecurityException if permission is denied
|
825 |
|
|
* @throws NullPointerException if key is null
|
826 |
|
|
* @throws IllegalArgumentException if key is ""
|
827 |
|
|
*
|
828 |
|
|
* @see System#getProperty(String)
|
829 |
|
|
*/
|
830 |
|
|
public void checkPropertyAccess(String key)
|
831 |
|
|
{
|
832 |
|
|
checkPermission(new PropertyPermission(key, "read"));
|
833 |
|
|
}
|
834 |
|
|
|
835 |
|
|
/**
|
836 |
|
|
* Check if the current thread is allowed to create a top-level window. If
|
837 |
|
|
* it is not, the operation should still go through, but some sort of
|
838 |
|
|
* nonremovable warning should be placed on the window to show that it
|
839 |
|
|
* is untrusted. This method is called by Window.Window(). The default
|
840 |
|
|
* implementation checks
|
841 |
|
|
* <code>AWTPermission("showWindowWithoutWarningBanner")</code>, and returns
|
842 |
|
|
* true if no exception was thrown. If you override this, use
|
843 |
|
|
* <code>return super.checkTopLevelWindow</code> rather than returning
|
844 |
|
|
* false.
|
845 |
|
|
*
|
846 |
|
|
* @param window the window to create
|
847 |
|
|
* @return true if there is permission to show the window without warning
|
848 |
|
|
* @throws NullPointerException if window is null
|
849 |
|
|
* @see java.awt.Window#Window(java.awt.Frame)
|
850 |
|
|
*/
|
851 |
|
|
public boolean checkTopLevelWindow(Object window)
|
852 |
|
|
{
|
853 |
|
|
if (window == null)
|
854 |
|
|
throw new NullPointerException();
|
855 |
|
|
try
|
856 |
|
|
{
|
857 |
|
|
checkPermission(new AWTPermission("showWindowWithoutWarningBanner"));
|
858 |
|
|
return true;
|
859 |
|
|
}
|
860 |
|
|
catch (SecurityException e)
|
861 |
|
|
{
|
862 |
|
|
return false;
|
863 |
|
|
}
|
864 |
|
|
}
|
865 |
|
|
|
866 |
|
|
/**
|
867 |
|
|
* Check if the current thread is allowed to create a print job. This
|
868 |
|
|
* method is called by Toolkit.getPrintJob(). The default implementation
|
869 |
|
|
* checks <code>RuntimePermission("queuePrintJob")</code>. If you override
|
870 |
|
|
* this, call <code>super.checkPrintJobAccess</code> rather than throwing
|
871 |
|
|
* an exception.
|
872 |
|
|
*
|
873 |
|
|
* @throws SecurityException if permission is denied
|
874 |
|
|
* @see java.awt.Toolkit#getPrintJob(java.awt.Frame, String, Properties)
|
875 |
|
|
* @since 1.1
|
876 |
|
|
*/
|
877 |
|
|
public void checkPrintJobAccess()
|
878 |
|
|
{
|
879 |
|
|
checkPermission(new RuntimePermission("queuePrintJob"));
|
880 |
|
|
}
|
881 |
|
|
|
882 |
|
|
/**
|
883 |
|
|
* Check if the current thread is allowed to use the system clipboard. This
|
884 |
|
|
* method is called by Toolkit.getSystemClipboard(). The default
|
885 |
|
|
* implementation checks <code>AWTPermission("accessClipboard")</code>. If
|
886 |
|
|
* you override this, call <code>super.checkSystemClipboardAccess</code>
|
887 |
|
|
* rather than throwing an exception.
|
888 |
|
|
*
|
889 |
|
|
* @throws SecurityException if permission is denied
|
890 |
|
|
* @see java.awt.Toolkit#getSystemClipboard()
|
891 |
|
|
* @since 1.1
|
892 |
|
|
*/
|
893 |
|
|
public void checkSystemClipboardAccess()
|
894 |
|
|
{
|
895 |
|
|
checkPermission(new AWTPermission("accessClipboard"));
|
896 |
|
|
}
|
897 |
|
|
|
898 |
|
|
/**
|
899 |
|
|
* Check if the current thread is allowed to use the AWT event queue. This
|
900 |
|
|
* method is called by Toolkit.getSystemEventQueue(). The default
|
901 |
|
|
* implementation checks <code>AWTPermission("accessEventQueue")</code>.
|
902 |
|
|
* you override this, call <code>super.checkAwtEventQueueAccess</code>
|
903 |
|
|
* rather than throwing an exception.
|
904 |
|
|
*
|
905 |
|
|
* @throws SecurityException if permission is denied
|
906 |
|
|
* @see java.awt.Toolkit#getSystemEventQueue()
|
907 |
|
|
* @since 1.1
|
908 |
|
|
*/
|
909 |
|
|
public void checkAwtEventQueueAccess()
|
910 |
|
|
{
|
911 |
|
|
checkPermission(new AWTPermission("accessEventQueue"));
|
912 |
|
|
}
|
913 |
|
|
|
914 |
|
|
/**
|
915 |
|
|
* Check if the current thread is allowed to access the specified package
|
916 |
|
|
* at all. This method is called by ClassLoader.loadClass() in user-created
|
917 |
|
|
* ClassLoaders. The default implementation gets a list of all restricted
|
918 |
|
|
* packages, via <code>Security.getProperty("package.access")</code>. Then,
|
919 |
|
|
* if packageName starts with or equals any restricted package, it checks
|
920 |
|
|
* <code>RuntimePermission("accessClassInPackage." + packageName)</code>.
|
921 |
|
|
* If you override this, you should call
|
922 |
|
|
* <code>super.checkPackageAccess</code> before doing anything else.
|
923 |
|
|
*
|
924 |
|
|
* @param packageName the package name to check access to
|
925 |
|
|
* @throws SecurityException if permission is denied
|
926 |
|
|
* @throws NullPointerException if packageName is null
|
927 |
|
|
* @see ClassLoader#loadClass(String, boolean)
|
928 |
|
|
* @see Security#getProperty(String)
|
929 |
|
|
*/
|
930 |
|
|
public void checkPackageAccess(String packageName)
|
931 |
|
|
{
|
932 |
|
|
checkPackageList(packageName, "package.access", "accessClassInPackage.");
|
933 |
|
|
}
|
934 |
|
|
|
935 |
|
|
/**
|
936 |
|
|
* Check if the current thread is allowed to define a class into the
|
937 |
|
|
* specified package. This method is called by ClassLoader.loadClass() in
|
938 |
|
|
* user-created ClassLoaders. The default implementation gets a list of all
|
939 |
|
|
* restricted packages, via
|
940 |
|
|
* <code>Security.getProperty("package.definition")</code>. Then, if
|
941 |
|
|
* packageName starts with or equals any restricted package, it checks
|
942 |
|
|
* <code>RuntimePermission("defineClassInPackage." + packageName)</code>.
|
943 |
|
|
* If you override this, you should call
|
944 |
|
|
* <code>super.checkPackageDefinition</code> before doing anything else.
|
945 |
|
|
*
|
946 |
|
|
* @param packageName the package name to check access to
|
947 |
|
|
* @throws SecurityException if permission is denied
|
948 |
|
|
* @throws NullPointerException if packageName is null
|
949 |
|
|
* @see ClassLoader#loadClass(String, boolean)
|
950 |
|
|
* @see Security#getProperty(String)
|
951 |
|
|
*/
|
952 |
|
|
public void checkPackageDefinition(String packageName)
|
953 |
|
|
{
|
954 |
|
|
checkPackageList(packageName, "package.definition", "defineClassInPackage.");
|
955 |
|
|
}
|
956 |
|
|
|
957 |
|
|
/**
|
958 |
|
|
* Check if the current thread is allowed to set the current socket factory.
|
959 |
|
|
* This method is called by Socket.setSocketImplFactory(),
|
960 |
|
|
* ServerSocket.setSocketFactory(), and URL.setURLStreamHandlerFactory().
|
961 |
|
|
* The default implementation checks
|
962 |
|
|
* <code>RuntimePermission("setFactory")</code>. If you override this, call
|
963 |
|
|
* <code>super.checkSetFactory</code> rather than throwing an exception.
|
964 |
|
|
*
|
965 |
|
|
* @throws SecurityException if permission is denied
|
966 |
|
|
* @see Socket#setSocketImplFactory(SocketImplFactory)
|
967 |
|
|
* @see ServerSocket#setSocketFactory(SocketImplFactory)
|
968 |
|
|
* @see URL#setURLStreamHandlerFactory(URLStreamHandlerFactory)
|
969 |
|
|
*/
|
970 |
|
|
public void checkSetFactory()
|
971 |
|
|
{
|
972 |
|
|
checkPermission(new RuntimePermission("setFactory"));
|
973 |
|
|
}
|
974 |
|
|
|
975 |
|
|
/**
|
976 |
|
|
* Check if the current thread is allowed to get certain types of Methods,
|
977 |
|
|
* Fields and Constructors from a Class object. This method is called by
|
978 |
|
|
* Class.getMethod[s](), Class.getField[s](), Class.getConstructor[s],
|
979 |
|
|
* Class.getDeclaredMethod[s](), Class.getDeclaredField[s](), and
|
980 |
|
|
* Class.getDeclaredConstructor[s](). The default implementation allows
|
981 |
|
|
* PUBLIC access, and access to classes defined by the same classloader as
|
982 |
|
|
* the code performing the reflection. Otherwise, it checks
|
983 |
|
|
* <code>RuntimePermission("accessDeclaredMembers")</code>. If you override
|
984 |
|
|
* this, do not call <code>super.checkMemberAccess</code>, as this would
|
985 |
|
|
* mess up the stack depth check that determines the ClassLoader requesting
|
986 |
|
|
* the access.
|
987 |
|
|
*
|
988 |
|
|
* @param c the Class to check
|
989 |
|
|
* @param memberType either DECLARED or PUBLIC
|
990 |
|
|
* @throws SecurityException if permission is denied, including when
|
991 |
|
|
* memberType is not DECLARED or PUBLIC
|
992 |
|
|
* @throws NullPointerException if c is null
|
993 |
|
|
* @see Class
|
994 |
|
|
* @see Member#DECLARED
|
995 |
|
|
* @see Member#PUBLIC
|
996 |
|
|
* @since 1.1
|
997 |
|
|
*/
|
998 |
|
|
public void checkMemberAccess(Class<?> c, int memberType)
|
999 |
|
|
{
|
1000 |
|
|
if (c == null)
|
1001 |
|
|
throw new NullPointerException();
|
1002 |
|
|
if (memberType == Member.PUBLIC)
|
1003 |
|
|
return;
|
1004 |
|
|
// XXX Allow access to classes created by same classloader before next
|
1005 |
|
|
// check.
|
1006 |
|
|
checkPermission(new RuntimePermission("accessDeclaredMembers"));
|
1007 |
|
|
}
|
1008 |
|
|
|
1009 |
|
|
/**
|
1010 |
|
|
* Test whether a particular security action may be taken. The default
|
1011 |
|
|
* implementation checks <code>SecurityPermission(action)</code>. If you
|
1012 |
|
|
* override this, call <code>super.checkSecurityAccess</code> rather than
|
1013 |
|
|
* throwing an exception.
|
1014 |
|
|
*
|
1015 |
|
|
* @param action the desired action to take
|
1016 |
|
|
* @throws SecurityException if permission is denied
|
1017 |
|
|
* @throws NullPointerException if action is null
|
1018 |
|
|
* @throws IllegalArgumentException if action is ""
|
1019 |
|
|
* @since 1.1
|
1020 |
|
|
*/
|
1021 |
|
|
public void checkSecurityAccess(String action)
|
1022 |
|
|
{
|
1023 |
|
|
checkPermission(new SecurityPermission(action));
|
1024 |
|
|
}
|
1025 |
|
|
|
1026 |
|
|
/**
|
1027 |
|
|
* Get the ThreadGroup that a new Thread should belong to by default. Called
|
1028 |
|
|
* by Thread.Thread(). The default implementation returns the current
|
1029 |
|
|
* ThreadGroup of the current Thread. <STRONG>Spec Note:</STRONG> it is not
|
1030 |
|
|
* clear whether the new Thread is guaranteed to pass the
|
1031 |
|
|
* checkAccessThreadGroup() test when using this ThreadGroup, but I presume
|
1032 |
|
|
* so.
|
1033 |
|
|
*
|
1034 |
|
|
* @return the ThreadGroup to put the new Thread into
|
1035 |
|
|
* @since 1.1
|
1036 |
|
|
*/
|
1037 |
|
|
public ThreadGroup getThreadGroup()
|
1038 |
|
|
{
|
1039 |
|
|
return Thread.currentThread().getThreadGroup();
|
1040 |
|
|
}
|
1041 |
|
|
|
1042 |
|
|
/**
|
1043 |
|
|
* Helper that checks a comma-separated list of restricted packages, from
|
1044 |
|
|
* <code>Security.getProperty("package.definition")</code>, for the given
|
1045 |
|
|
* package access permission. If packageName starts with or equals any
|
1046 |
|
|
* restricted package, it checks
|
1047 |
|
|
* <code>RuntimePermission(permission + packageName)</code>.
|
1048 |
|
|
*
|
1049 |
|
|
* @param packageName the package name to check access to
|
1050 |
|
|
* @param restriction "package.access" or "package.definition"
|
1051 |
|
|
* @param permission the base permission, including the '.'
|
1052 |
|
|
* @throws SecurityException if permission is denied
|
1053 |
|
|
* @throws NullPointerException if packageName is null
|
1054 |
|
|
* @see #checkPackageAccess(String)
|
1055 |
|
|
* @see #checkPackageDefinition(String)
|
1056 |
|
|
*/
|
1057 |
|
|
void checkPackageList(String packageName, final String restriction,
|
1058 |
|
|
String permission)
|
1059 |
|
|
{
|
1060 |
|
|
if (packageName == null)
|
1061 |
|
|
throw new NullPointerException();
|
1062 |
|
|
|
1063 |
|
|
String list = (String)AccessController.doPrivileged(new PrivilegedAction()
|
1064 |
|
|
{
|
1065 |
|
|
public Object run()
|
1066 |
|
|
{
|
1067 |
|
|
return Security.getProperty(restriction);
|
1068 |
|
|
}
|
1069 |
|
|
});
|
1070 |
|
|
|
1071 |
|
|
if (list == null || list.equals(""))
|
1072 |
|
|
return;
|
1073 |
|
|
|
1074 |
|
|
String packageNamePlusDot = packageName + ".";
|
1075 |
|
|
|
1076 |
|
|
StringTokenizer st = new StringTokenizer(list, ",");
|
1077 |
|
|
while (st.hasMoreTokens())
|
1078 |
|
|
{
|
1079 |
|
|
if (packageNamePlusDot.startsWith(st.nextToken()))
|
1080 |
|
|
{
|
1081 |
|
|
Permission p = new RuntimePermission(permission + packageName);
|
1082 |
|
|
checkPermission(p);
|
1083 |
|
|
return;
|
1084 |
|
|
}
|
1085 |
|
|
}
|
1086 |
|
|
}
|
1087 |
|
|
}
|