📄 derby_tests.policy
字号:
//// Policy file with minimal set of permissions to run derby's// functional tests.//// The test harness sets up three variables used by this policy file//// csinfo.codejar - URL to the jar files when they are in the classpath// csinfo.codeclasses - URL to the classes directory when it is in the classpath//// Only one of csinfo.codejar and csinfo.codeclasses will be valid, the// other will be set to a bogus URL like file://unused//// csinfo.codedir - File location of either csinfo.codejar or csinfo.codejar.// Only required due to a BUG.//// Permissions for the embedded engine (derby.jar)//grant codeBase "${csinfo.codejar}derby.jar" { permission java.util.PropertyPermission "derby.*", "read"; permission java.lang.RuntimePermission "createClassLoader"; permission java.io.FilePermission "${derby.system.home}${/}derby.properties", "read"; permission java.io.FilePermission "${derby.system.home}${/}derby.log", "read, write, delete"; permission java.io.FilePermission "${derby.system.home}", "read"; // all databases under derby.system.home permission java.io.FilePermission "${derby.system.home}${/}-", "read, write, delete"; // Import/export and other support files from these locations in tests permission java.io.FilePermission "${user.dir}${/}extin${/}*", "read"; permission java.io.FilePermission "${user.dir}${/}extinout${/}*", "read, write"; permission java.io.FilePermission "${user.dir}${/}extout${/}*", "write"; // BUG DERBY-622 derbynet/sysinfo.java permission java.io.FilePermission "${csinfo.codedir}${/}*", "read"; // sane=true, jdbcapi/secureUsers1.sql permission java.io.FilePermission "${user.dir}${/}CloudLDAP.out", "write"; };//// Permissions for the network server (derbynet.jar)//grant codeBase "${csinfo.codejar}derbynet.jar" { permission java.net.SocketPermission "127.0.0.1", "accept"; permission java.net.SocketPermission "localhost", "accept"; permission java.net.SocketPermission "${csinfo.serverhost}", "accept"; permission java.net.SocketPermission "${csinfo.trustedhost}", "accept"; // tracing files default to derby.system.home, derbynet/getCurrentProperties.java permission java.io.FilePermission "${derby.system.home}${/}*", "write"; // BUG DERBY-622 derbynet/sysinfo.java permission java.io.FilePermission "${csinfo.codedir}${/}*", "read"; // BUG DERBY-623 - sane=true permission java.util.PropertyPermission "derby.monitor.verbose", "read"; permission java.util.PropertyPermission "derby.debug.*", "read"; // sane=true, jdbcapi/secureUsers1.sql permission java.io.FilePermission "${user.dir}${/}CloudLDAP.out", "write"; };//// Permissions for the tests (derbyTesting.jar)// We are liberal here, it's not a goal to make the test harness// or tests secure.//grant codeBase "${csinfo.codejar}derbyTesting.jar" { // Access all properties using System.getProperties permission java.util.PropertyPermission "*", "read, write";};//// super-set of the jar permissions for running out of the classes directory//grant codeBase "${csinfo.codeclasses}" { permission java.util.PropertyPermission "derby.*", "read"; permission java.lang.RuntimePermission "createClassLoader"; permission java.util.PropertyPermission "*", "read, write"; permission java.io.FilePermission "${derby.system.home}${/}derby.properties", "read"; permission java.io.FilePermission "${derby.system.home}${/}derby.log", "read, write, delete"; permission java.io.FilePermission "${derby.system.home}", "read"; permission java.io.FilePermission "${derby.system.home}${/}-", "read, write, delete"; permission java.net.SocketPermission "127.0.0.1", "accept"; permission java.net.SocketPermission "localhost", "accept"; permission java.net.SocketPermission "${csinfo.serverhost}", "accept"; permission java.net.SocketPermission "${csinfo.trustedhost}", "accept"; // Import/export and other support files from these locations in tests permission java.io.FilePermission "${user.dir}${/}extin${/}*", "read"; permission java.io.FilePermission "${user.dir}${/}extinout${/}*", "read, write"; permission java.io.FilePermission "${user.dir}${/}extout${/}*", "write"; // sane=true, jdbcapi/secureUsers1.sql permission java.io.FilePermission "${user.dir}${/}CloudLDAP.out", "write"; };
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -