All Downloads are FREE. Search and download functionalities are using the official Maven repository.

java.lang.SecurityManager Maven / Gradle / Ivy

/*

This is not an official specification document, and usage is restricted.

NOTICE


(c) 2005-2007 Sun Microsystems, Inc. All Rights Reserved.

Neither this file nor any files generated from it describe a complete specification, and they may only be used as described below. For example, no permission is given for you to incorporate this file, in whole or in part, in an implementation of a Java specification.

Sun Microsystems Inc. owns the copyright in this file and it is provided to you for informative, as opposed to normative, use. The file and any files generated from it may be used to generate other informative documentation, such as a unified set of documents of API signatures for a platform that includes technologies expressed as Java APIs. The file may also be used to produce "compilation stubs," which allow applications to be compiled and validated for such platforms.

Any work generated from this file, such as unified javadocs or compiled stub files, must be accompanied by this notice in its entirety.

This work corresponds to the API signatures of JSR 219: Foundation Profile 1.1. In the event of a discrepency between this work and the JSR 219 specification, which is available at http://www.jcp.org/en/jsr/detail?id=219, the latter takes precedence. */ package java.lang; import java.security.*; import java.lang.reflect.*; import java.io.FileDescriptor; import java.io.File; import java.io.FilePermission; import java.util.PropertyPermission; import java.lang.RuntimePermission; import java.net.SocketPermission; import java.net.NetPermission; import java.util.Hashtable; import java.net.InetAddress; import java.lang.reflect.Member; import java.net.URL; /** * The security manager is a class that allows * applications to implement a security policy. It allows an * application to determine, before performing a possibly unsafe or * sensitive operation, what the operation is and whether * it is being attempted in a security context that allows the * operation to be performed. The * application can allow or disallow the operation. *

* The SecurityManager class contains many methods with * names that begin with the word check. These methods * are called by various methods in the Java libraries before those * methods perform certain potentially sensitive operations. The * invocation of such a check method typically looks like this: *

 *     SecurityManager security = System.getSecurityManager();
 *     if (security != null) {
 *         security.checkXXX(argument,  . . . );
 *     }
 * 
*

* The security manager is thereby given an opportunity to prevent * completion of the operation by throwing an exception. A security * manager routine simply returns if the operation is permitted, but * throws a SecurityException if the operation is not * permitted. The only exception to this convention is * checkTopLevelWindow, which returns a * boolean value. *

* The current security manager is set by the * setSecurityManager method in class * System. The current security manager is obtained * by the getSecurityManager method. *

* The special method * {@link SecurityManager#checkPermission(java.security.Permission)} * determines whether an access request indicated by a specified * permission should be granted or denied. The * default implementation calls * *

 *   AccessController.checkPermission(perm);
 * 
* *

* If a requested access is allowed, * checkPermission returns quietly. If denied, a * SecurityException is thrown. *

* As of Java 2 SDK v1.2, the default implementation of each of the other * check methods in SecurityManager is to * call the SecurityManager checkPermission method * to determine if the calling thread has permission to perform the requested * operation. *

* Note that the checkPermission method with * just a single permission argument always performs security checks * within the context of the currently executing thread. * Sometimes a security check that should be made within a given context * will actually need to be done from within a * different context (for example, from within a worker thread). * The {@link SecurityManager#getSecurityContext getSecurityContext} method * and the {@link SecurityManager#checkPermission(java.security.Permission, * java.lang.Object) checkPermission} * method that includes a context argument are provided * for this situation. The * getSecurityContext method returns a "snapshot" * of the current calling context. (The default implementation * returns an AccessControlContext object.) A sample call is * the following: * *

 *   Object context = null;
 *   SecurityManager sm = System.getSecurityManager();
 *   if (sm != null) context = sm.getSecurityContext(); 
 * 
* *

* The checkPermission method * that takes a context object in addition to a permission * makes access decisions based on that context, * rather than on that of the current execution thread. * Code within a different context can thus call that method, * passing the permission and the * previously-saved context object. A sample call, using the * SecurityManager sm obtained as in the previous example, * is the following: * *

 *   if (sm != null) sm.checkPermission(permission, context);
 * 
* *

Permissions fall into these categories: File, Socket, Net, * Security, Runtime, Property, AWT, Reflect, and Serializable. * The classes managing these various * permission categories are java.io.FilePermission, * java.net.SocketPermission, * java.net.NetPermission, * java.security.SecurityPermission, * java.lang.RuntimePermission, * java.util.PropertyPermission, * java.lang.reflect.ReflectPermission, and * java.io.SerializablePermission. * *

All but the first two (FilePermission and SocketPermission) are * subclasses of java.security.BasicPermission, which itself * is an abstract subclass of the * top-level class for permissions, which is * java.security.Permission. BasicPermission defines the * functionality needed for all permissions that contain a name * that follows the hierarchical property naming convention * (for example, "exitVM", "setFactory", "queuePrintJob", etc). * An asterisk * may appear at the end of the name, following a ".", or by itself, to * signify a wildcard match. For example: "a.*" or "*" is valid, * "*a" or "a*b" is not valid. * *

FilePermission and SocketPermission are subclasses of the * top-level class for permissions * (java.security.Permission). Classes like these * that have a more complicated name syntax than that used by * BasicPermission subclass directly from Permission rather than from * BasicPermission. For example, * for a java.io.FilePermission object, the permission name is * the path name of a file (or directory). * *

Some of the permission classes have an "actions" list that tells * the actions that are permitted for the object. For example, * for a java.io.FilePermission object, the actions list * (such as "read, write") specifies which actions are granted for the * specified file (or for files in the specified directory). * *

Other permission classes are for "named" permissions - * ones that contain a name but no actions list; you either have the * named permission or you don't. * *

Note: There is also a java.security.AllPermission * permission that implies all permissions. It exists to simplify the work * of system administrators who might need to perform multiple * tasks that require all (or numerous) permissions. *

* See * Permissions in the Java 2 SDK for permission-related information. * This document includes, for example, a table listing the various SecurityManager * check methods and the permission(s) the default * implementation of each such method requires. * It also contains a table of all the version 1.2 methods * that require permissions, and for each such method tells * which permission it requires. *

* For more information about SecurityManager changes made in * the Java 2 SDK and advice regarding porting of 1.1-style security managers, * see the security documentation. * * @author Arthur van Hoff * @author Roland Schemers * * @version 1.125, 05/16/00 * @see java.lang.ClassLoader * @see java.lang.SecurityException * @see java.lang.SecurityManager#checkTopLevelWindow(java.lang.Object) * checkTopLevelWindow * @see java.lang.System#getSecurityManager() getSecurityManager * @see java.lang.System#setSecurityManager(java.lang.SecurityManager) * setSecurityManager * @see java.security.AccessController AccessController * @see java.security.AccessControlContext AccessControlContext * @see java.security.AccessControlException AccessControlException * @see java.security.Permission * @see java.security.BasicPermission * @see java.io.FilePermission * @see java.net.SocketPermission * @see java.util.PropertyPermission * @see java.lang.RuntimePermission * @see java.security.Policy Policy * @see java.security.SecurityPermission SecurityPermission * @see java.security.ProtectionDomain * * @since JDK1.0 */ public class SecurityManager { /** * Constructs a new SecurityManager. * *

If there is a security manager already installed, this method first * calls the security manager's checkPermission method * with the RuntimePermission("createSecurityManager") * permission to ensure the calling thread has permission to create a new * security manager. * This may result in throwing a SecurityException. * * @exception java.lang.SecurityException if a security manager already * exists and its checkPermission method * doesn't allow creation of a new security manager. * @see java.lang.System#getSecurityManager() * @see #checkPermission(java.security.Permission) checkPermission * @see java.lang.RuntimePermission */ public SecurityManager() { } /** * Returns the current execution stack as an array of classes. *

* The length of the array is the number of methods on the execution * stack. The element at index 0 is the class of the * currently executing method, the element at index 1 is * the class of that method's caller, and so on. * * @return the execution stack. */ protected java.lang.Class[] getClassContext() { return null; } /** * Creates an object that encapsulates the current execution * environment. The result of this method is used, for example, by the * three-argument checkConnect method and by the * two-argument checkRead method. * These methods are needed because a trusted method may be called * on to read a file or open a socket on behalf of another method. * The trusted method needs to determine if the other (possibly * untrusted) method would be allowed to perform the operation on its * own. *

The default implementation of this method is to return * an AccessControlContext object. * * @return an implementation-dependent object that encapsulates * sufficient information about the current execution environment * to perform some security checks later. * @see java.lang.SecurityManager#checkConnect(java.lang.String, int, * java.lang.Object) checkConnect * @see java.lang.SecurityManager#checkRead(java.lang.String, * java.lang.Object) checkRead * @see java.security.AccessControlContext AccessControlContext */ public java.lang.Object getSecurityContext() { return null; } /** * Throws a SecurityException if the requested * access, specified by the given permission, is not permitted based * on the security policy currently in effect. *

* This method calls AccessController.checkPermission * with the given permission. * * @param perm the requested permission. * @exception SecurityException if access is not permitted based on * the current security policy. * @exception NullPointerException if the permission argument is * null. * @since 1.2 */ public void checkPermission(Permission perm) { } /** * Throws a SecurityException if the * specified security context is denied access to the resource * specified by the given permission. * The context must be a security * context returned by a previous call to * getSecurityContext and the access control * decision is based upon the configured security policy for * that security context. *

* If context is an instance of * AccessControlContext then the * AccessControlContext.checkPermission method is * invoked with the specified permission. *

* If context is not an instance of * AccessControlContext then a * SecurityException is thrown. * * @param perm the specified permission * @param context a system-dependent security context. * @exception SecurityException if the specified security context * is not an instance of AccessControlContext * (e.g., is null), or is denied access to the * resource specified by the given permission. * @exception NullPointerException if the permission argument is * null. * @see java.lang.SecurityManager#getSecurityContext() * @see java.security.AccessControlContext#checkPermission(java.security.Permission) * @since 1.2 */ public void checkPermission(Permission perm, java.lang.Object context) { } /** * Throws a SecurityException if the * calling thread is not allowed to create a new class loader. *

* This method calls checkPermission with the * RuntimePermission("createClassLoader") * permission. *

* If you override this method, then you should make a call to * super.checkCreateClassLoader * at the point the overridden method would normally throw an * exception. * * @exception SecurityException if the calling thread does not * have permission * to create a new class loader. * @see java.lang.ClassLoader#ClassLoader() * @see #checkPermission(java.security.Permission) checkPermission */ public void checkCreateClassLoader() { } /** * Throws a SecurityException if the * calling thread is not allowed to modify the thread argument. *

* This method is invoked for the current security manager by the * stop, suspend, resume, * setPriority, setName, and * setDaemon methods of class Thread. *

* If the thread argument is a system thread (belongs to * the thread group with a null parent) then * this method calls checkPermission with the * RuntimePermission("modifyThread") permission. * If the thread argument is not a system thread, * this method just returns silently. *

* Applications that want a stricter policy should override this * method. If this method is overridden, the method that overrides * it should additionally check to see if the calling thread has the * RuntimePermission("modifyThread") permission, and * if so, return silently. This is to ensure that code granted * that permission (such as the SDK itself) is allowed to * manipulate any thread. *

* If this method is overridden, then * super.checkAccess should * be called by the first statement in the overridden method, or the * equivalent security check should be placed in the overridden method. * * @param t the thread to be checked. * @exception SecurityException if the calling thread does not have * permission to modify the thread. * @exception NullPointerException if the thread argument is * null. * @see java.lang.Thread#setDaemon(boolean) setDaemon * @see java.lang.Thread#setName(java.lang.String) setName * @see java.lang.Thread#setPriority(int) setPriority * @see #checkPermission(java.security.Permission) checkPermission */ public void checkAccess(java.lang.Thread t) { } /** * Throws a SecurityException if the * calling thread is not allowed to modify the thread group argument. *

* This method is invoked for the current security manager when a * new child thread or child thread group is created, and by the * setDaemon, setMaxPriority, * stop, suspend, resume, and * destroy methods of class ThreadGroup. *

* If the thread group argument is the system thread group ( * has a null parent) then * this method calls checkPermission with the * RuntimePermission("modifyThreadGroup") permission. * If the thread group argument is not the system thread group, * this method just returns silently. *

* Applications that want a stricter policy should override this * method. If this method is overridden, the method that overrides * it should additionally check to see if the calling thread has the * RuntimePermission("modifyThreadGroup") permission, and * if so, return silently. This is to ensure that code granted * that permission (such as the SDK itself) is allowed to * manipulate any thread. *

* If this method is overridden, then * super.checkAccess should * be called by the first statement in the overridden method, or the * equivalent security check should be placed in the overridden method. * * @param g the thread group to be checked. * @exception SecurityException if the calling thread does not have * permission to modify the thread group. * @exception NullPointerException if the thread group argument is * null. * @see java.lang.ThreadGroup#destroy() destroy * @see java.lang.ThreadGroup#setDaemon(boolean) setDaemon * @see java.lang.ThreadGroup#setMaxPriority(int) setMaxPriority * @see #checkPermission(java.security.Permission) checkPermission */ public void checkAccess(java.lang.ThreadGroup g) { } /** * Throws a SecurityException if the * calling thread is not allowed to cause the Java Virtual Machine to * halt with the specified status code. *

* This method is invoked for the current security manager by the * exit method of class Runtime. A status * of 0 indicates success; other values indicate various * errors. *

* This method calls checkPermission with the * RuntimePermission("exitVM") permission. *

* If you override this method, then you should make a call to * super.checkExit * at the point the overridden method would normally throw an * exception. * * @param status the exit status. * @exception SecurityException if the calling thread does not have * permission to halt the Java Virtual Machine with * the specified status. * @see java.lang.Runtime#exit(int) exit * @see #checkPermission(java.security.Permission) checkPermission */ public void checkExit(int status) { } /** * Throws a SecurityException if the * calling thread is not allowed to create a subprocess. *

* This method is invoked for the current security manager by the * exec methods of class Runtime. *

* This method calls checkPermission with the * FilePermission(cmd,"execute") permission * if cmd is an absolute path, otherwise it calls * checkPermission with * FilePermission("<<ALL FILES>>","execute"). *

* If you override this method, then you should make a call to * super.checkExec * at the point the overridden method would normally throw an * exception. * * @param cmd the specified system command. * @exception SecurityException if the calling thread does not have * permission to create a subprocess. * @exception NullPointerException if the cmd argument is * null. * @see java.lang.Runtime#exec(java.lang.String) * @see java.lang.Runtime#exec(java.lang.String, java.lang.String[]) * @see java.lang.Runtime#exec(java.lang.String[]) * @see java.lang.Runtime#exec(java.lang.String[], java.lang.String[]) * @see #checkPermission(java.security.Permission) checkPermission */ public void checkExec(java.lang.String cmd) { } /** * Throws a SecurityException if the * calling thread is not allowed to dynamic link the library code * specified by the string argument file. The argument is either a * simple library name or a complete filename. *

* This method is invoked for the current security manager by * methods load and loadLibrary of class * Runtime. *

* This method calls checkPermission with the * RuntimePermission("loadLibrary."+lib) permission. *

* If you override this method, then you should make a call to * super.checkLink * at the point the overridden method would normally throw an * exception. * * @param lib the name of the library. * @exception SecurityException if the calling thread does not have * permission to dynamically link the library. * @exception NullPointerException if the lib argument is * null. * @see java.lang.Runtime#load(java.lang.String) * @see java.lang.Runtime#loadLibrary(java.lang.String) * @see #checkPermission(java.security.Permission) checkPermission */ public void checkLink(java.lang.String lib) { } /** * Throws a SecurityException if the * calling thread is not allowed to read from the specified file * descriptor. *

* This method calls checkPermission with the * RuntimePermission("readFileDescriptor") * permission. *

* If you override this method, then you should make a call to * super.checkRead * at the point the overridden method would normally throw an * exception. * * @param fd the system-dependent file descriptor. * @exception SecurityException if the calling thread does not have * permission to access the specified file descriptor. * @exception NullPointerException if the file descriptor argument is * null. * @see java.io.FileDescriptor * @see #checkPermission(java.security.Permission) checkPermission */ public void checkRead(java.io.FileDescriptor fd) { } /** * Throws a SecurityException if the * calling thread is not allowed to read the file specified by the * string argument. *

* This method calls checkPermission with the * FilePermission(file,"read") permission. *

* If you override this method, then you should make a call to * super.checkRead * at the point the overridden method would normally throw an * exception. * * @param file the system-dependent file name. * @exception SecurityException if the calling thread does not have * permission to access the specified file. * @exception NullPointerException if the file argument is * null. * @see #checkPermission(java.security.Permission) checkPermission */ public void checkRead(java.lang.String file) { } /** * Throws a SecurityException if the * specified security context is not allowed to read the file * specified by the string argument. The context must be a security * context returned by a previous call to * getSecurityContext. *

If context is an instance of * AccessControlContext then the * AccessControlContext.checkPermission method will * be invoked with the FilePermission(file,"read") permission. *

If context is not an instance of * AccessControlContext then a * SecurityException is thrown. *

* If you override this method, then you should make a call to * super.checkRead * at the point the overridden method would normally throw an * exception. * * @param file the system-dependent filename. * @param context a system-dependent security context. * @exception SecurityException if the specified security context * is not an instance of AccessControlContext * (e.g., is null), or does not have permission * to read the specified file. * @exception NullPointerException if the file argument is * null. * @see java.lang.SecurityManager#getSecurityContext() * @see java.security.AccessControlContext#checkPermission(java.security.Permission) */ public void checkRead(java.lang.String file, java.lang.Object context) { } /** * Throws a SecurityException if the * calling thread is not allowed to write to the specified file * descriptor. *

* This method calls checkPermission with the * RuntimePermission("writeFileDescriptor") * permission. *

* If you override this method, then you should make a call to * super.checkWrite * at the point the overridden method would normally throw an * exception. * * @param fd the system-dependent file descriptor. * @exception SecurityException if the calling thread does not have * permission to access the specified file descriptor. * @exception NullPointerException if the file descriptor argument is * null. * @see java.io.FileDescriptor * @see #checkPermission(java.security.Permission) checkPermission */ public void checkWrite(java.io.FileDescriptor fd) { } /** * Throws a SecurityException if the * calling thread is not allowed to write to the file specified by * the string argument. *

* This method calls checkPermission with the * FilePermission(file,"write") permission. *

* If you override this method, then you should make a call to * super.checkWrite * at the point the overridden method would normally throw an * exception. * * @param file the system-dependent filename. * @exception SecurityException if the calling thread does not * have permission to access the specified file. * @exception NullPointerException if the file argument is * null. * @see #checkPermission(java.security.Permission) checkPermission */ public void checkWrite(java.lang.String file) { } /** * Throws a SecurityException if the * calling thread is not allowed to delete the specified file. *

* This method is invoked for the current security manager by the * delete method of class File. *

* This method calls checkPermission with the * FilePermission(file,"delete") permission. *

* If you override this method, then you should make a call to * super.checkDelete * at the point the overridden method would normally throw an * exception. * * @param file the system-dependent filename. * @exception SecurityException if the calling thread does not * have permission to delete the file. * @exception NullPointerException if the file argument is * null. * @see java.io.File#delete() * @see #checkPermission(java.security.Permission) checkPermission */ public void checkDelete(java.lang.String file) { } /** * Throws a SecurityException if the * calling thread is not allowed to open a socket connection to the * specified host and port number. *

* A port number of -1 indicates that the calling * method is attempting to determine the IP address of the specified * host name. *

* This method calls checkPermission with the * SocketPermission(host+":"+port,"connect") permission if * the port is not equal to -1. If the port is equal to -1, then * it calls checkPermission with the * SocketPermission(host,"resolve") permission. *

* If you override this method, then you should make a call to * super.checkConnect * at the point the overridden method would normally throw an * exception. * * @param host the host name port to connect to. * @param port the protocol port to connect to. * @exception SecurityException if the calling thread does not have * permission to open a socket connection to the specified * host and port. * @exception NullPointerException if the host argument is * null. * @see #checkPermission(java.security.Permission) checkPermission */ public void checkConnect(java.lang.String host, int port) { } /** * Throws a SecurityException if the * specified security context is not allowed to open a socket * connection to the specified host and port number. *

* A port number of -1 indicates that the calling * method is attempting to determine the IP address of the specified * host name. *

If context is not an instance of * AccessControlContext then a * SecurityException is thrown. *

* Otherwise, the port number is checked. If it is not equal * to -1, the context's checkPermission * method is called with a * SocketPermission(host+":"+port,"connect") permission. * If the port is equal to -1, then * the context's checkPermission method * is called with a * SocketPermission(host,"resolve") permission. *

* If you override this method, then you should make a call to * super.checkConnect * at the point the overridden method would normally throw an * exception. * * @param host the host name port to connect to. * @param port the protocol port to connect to. * @param context a system-dependent security context. * @exception SecurityException if the specified security context * is not an instance of AccessControlContext * (e.g., is null), or does not have permission * to open a socket connection to the specified * host and port. * @exception NullPointerException if the host argument is * null. * @see java.lang.SecurityManager#getSecurityContext() * @see java.security.AccessControlContext#checkPermission(java.security.Permission) */ public void checkConnect(java.lang.String host, int port, java.lang.Object context) { } /** * Throws a SecurityException if the * calling thread is not allowed to wait for a connection request on * the specified local port number. *

* If port is not 0, this method calls * checkPermission with the * SocketPermission("localhost:"+port,"listen"). * If port is zero, this method calls checkPermission * with SocketPermission("localhost:1024-","listen"). *

* If you override this method, then you should make a call to * super.checkListen * at the point the overridden method would normally throw an * exception. * * @param port the local port. * @exception SecurityException if the calling thread does not have * permission to listen on the specified port. * @see #checkPermission(java.security.Permission) checkPermission */ public void checkListen(int port) { } /** * Throws a SecurityException if the * calling thread is not permitted to accept a socket connection from * the specified host and port number. *

* This method is invoked for the current security manager by the * accept method of class ServerSocket. * NOTE: java.net.ServerSocket is found in J2ME CDC profiles such as * J2ME Foundation Profile. *

* This method calls checkPermission with the * SocketPermission(host+":"+port,"accept") permission. *

* If you override this method, then you should make a call to * super.checkAccept * at the point the overridden method would normally throw an * exception. * * @param host the host name of the socket connection. * @param port the port number of the socket connection. * @exception SecurityException if the calling thread does not have * permission to accept the connection. * @exception NullPointerException if the host argument is * null. * @see java.net.ServerSocket#accept() * @see #checkPermission(java.security.Permission) checkPermission */ public void checkAccept(java.lang.String host, int port) { } /** * Throws a SecurityException if the * calling thread is not allowed to use * (join/leave/send/receive) IP multicast. *

* This method calls checkPermission with the * java.net.SocketPermission(maddr.getHostAddress(), * "accept,connect") permission. *

* If you override this method, then you should make a call to * super.checkMulticast * at the point the overridden method would normally throw an * exception. * * @param maddr Internet group address to be used. * @exception SecurityException if the calling thread is not allowed to * use (join/leave/send/receive) IP multicast. * @exception NullPointerException if the address argument is * null. * @since JDK1.1 * @see #checkPermission(java.security.Permission) checkPermission */ public void checkMulticast(InetAddress maddr) { } /** * Throws a SecurityException if the * calling thread is not allowed to use * (join/leave/send/receive) IP multicast. *

* This method calls checkPermission with the * java.net.SocketPermission(maddr.getHostAddress(), * "accept,connect") permission. *

* If you override this method, then you should make a call to * super.checkMulticast * at the point the overridden method would normally throw an * exception. * * @param maddr Internet group address to be used. * @param ttl value in use, if it is multicast send. * Note: this particular implementation does not use the ttl * parameter. * @exception SecurityException if the calling thread is not allowed to * use (join/leave/send/receive) IP multicast. * @exception NullPointerException if the address argument is * null. * @since JDK1.1 * @deprecated Use #checkPermission(java.security.Permission) instead * @see #checkPermission(java.security.Permission) checkPermission */ public void checkMulticast(InetAddress maddr, byte ttl) { } /** * Throws a SecurityException if the * calling thread is not allowed to access or modify the system * properties. *

* This method is used by the getProperties and * setProperties methods of class System. *

* This method calls checkPermission with the * PropertyPermission("*", "read,write") permission. *

* If you override this method, then you should make a call to * super.checkPropertiesAccess * at the point the overridden method would normally throw an * exception. *

* * @exception SecurityException if the calling thread does not have * permission to access or modify the system properties. * @see java.lang.System#getProperties() * @see java.lang.System#setProperties(java.util.Properties) * @see #checkPermission(java.security.Permission) checkPermission */ public void checkPropertiesAccess() { } /** * Throws a SecurityException if the * calling thread is not allowed to access the system property with * the specified key name. *

* This method is used by the getProperty method of * class System. *

* This method calls checkPermission with the * PropertyPermission(key, "read") permission. *

*

* If you override this method, then you should make a call to * super.checkPropertyAccess * at the point the overridden method would normally throw an * exception. * * @param key a system property key. * * @exception SecurityException if the calling thread does not have * permission to access the specified system property. * @exception NullPointerException if the key argument is * null. * @exception IllegalArgumentException if key is empty. * * @see java.lang.System#getProperty(java.lang.String) * @see #checkPermission(java.security.Permission) checkPermission */ public void checkPropertyAccess(java.lang.String key) { } /** * Returns false if the calling * thread is not trusted to bring up the top-level window indicated * by the window argument, or the AWT package is not * available. * In this case, the caller can * still decide to show the window, but the window should include * some sort of visual warning. If the method returns * true, then the window can be shown without any * special restrictions. *

* See class Window for more information on trusted and * untrusted windows. *

* If you override this method, then you should make a call to * super.checkTopLevelWindow * at the point the overridden method would normally return * false, and the value of * super.checkTopLevelWindow should * be returned. * * @param window the new window that is being created. * @return true if the calling thread is trusted to put up * top-level windows; false otherwise. * @exception NullPointerException if the window argument is * null. * @see java.awt.Window * @see #checkPermission(java.security.Permission) checkPermission */ public boolean checkTopLevelWindow(java.lang.Object window) { return false; } /** * Throws a SecurityException if the * calling thread is not allowed to initiate a print job request. *

* This method calls * checkPermission with the * RuntimePermission("queuePrintJob") permission. *

* If you override this method, then you should make a call to * super.checkPrintJobAccess * at the point the overridden method would normally throw an * exception. *

* * @exception SecurityException if the calling thread does not have * permission to initiate a print job request. * @since JDK1.1 * @see #checkPermission(java.security.Permission) checkPermission */ public void checkPrintJobAccess() { } /** * Throws a SecurityException if the * calling thread is not allowed to access the system clipboard, or * the AWT package is not available. *

* If you override this method, then you should make a call to * super.checkSystemClipboardAccess * at the point the overridden method would normally throw an * exception. * * @since JDK1.1 * @exception SecurityException if the calling thread does not have * permission to access the system clipboard. * @see #checkPermission(java.security.Permission) checkPermission */ public void checkSystemClipboardAccess() { } /** * Throws a SecurityException if the * calling thread is not allowed to access the AWT event queue, or * the AWT package is not available. *

* If you override this method, then you should make a call to * super.checkAwtEventQueueAccess * at the point the overridden method would normally throw an * exception. * * @since JDK1.1 * @exception SecurityException if the calling thread does not have * permission to access the AWT event queue. * @see #checkPermission(java.security.Permission) checkPermission */ public void checkAwtEventQueueAccess() { } /** * Throws a SecurityException if the * calling thread is not allowed to access the package specified by * the argument. *

* This method is used by the loadClass method of class * loaders. *

* This method first gets a list of * restricted packages by obtaining a comma-separated list from * a call to * java.security.Security.getProperty("package.access"), * and checks to see if pkg starts with or equals * any of the restricted packages. If it does, then * checkPermission gets called with the * RuntimePermission("accessClassInPackage."+pkg) * permission. *

* If this method is overridden, then * super.checkPackageAccess should be called * as the first line in the overridden method. * * @param pkg the package name. * @exception SecurityException if the calling thread does not have * permission to access the specified package. * @exception NullPointerException if the package name argument is * null. * @see java.lang.ClassLoader#loadClass(java.lang.String, boolean) * loadClass * @see java.security.Security#getProperty getProperty * @see #checkPermission(java.security.Permission) checkPermission */ public void checkPackageAccess(java.lang.String pkg) { } /** * Throws a SecurityException if the * calling thread is not allowed to define classes in the package * specified by the argument. *

* This method is used by the loadClass method of some * class loaders. *

* This method first gets a list of restricted packages by * obtaining a comma-separated list from a call to * java.security.Security.getProperty("package.definition"), * and checks to see if pkg starts with or equals * any of the restricted packages. If it does, then * checkPermission gets called with the * RuntimePermission("defineClassInPackage."+pkg) * permission. *

* If this method is overridden, then * super.checkPackageDefinition should be called * as the first line in the overridden method. * * @param pkg the package name. * @exception SecurityException if the calling thread does not have * permission to define classes in the specified package. * @see java.lang.ClassLoader#loadClass(java.lang.String, boolean) * @see java.security.Security#getProperty getProperty * @see #checkPermission(java.security.Permission) checkPermission */ public void checkPackageDefinition(java.lang.String pkg) { } /** * Throws a SecurityException if the * calling thread is not allowed to set the socket factory used by * ServerSocket or Socket, or the stream * handler factory used by URL. * NOTE: java.net.ServerSocket is found in J2ME CDC profiles such as * J2ME Foundation Profile. *

* This method calls checkPermission with the * RuntimePermission("setFactory") permission. *

* If you override this method, then you should make a call to * super.checkSetFactory * at the point the overridden method would normally throw an * exception. *

* * @exception SecurityException if the calling thread does not have * permission to specify a socket factory or a stream * handler factory. * * @see java.net.ServerSocket#setSocketFactory(java.net.SocketImplFactory) setSocketFactory * @see java.net.Socket#setSocketImplFactory(java.net.SocketImplFactory) setSocketImplFactory * @see java.net.URL#setURLStreamHandlerFactory(java.net.URLStreamHandlerFactory) setURLStreamHandlerFactory * @see #checkPermission(java.security.Permission) checkPermission */ public void checkSetFactory() { } /** * Throws a SecurityException if the * calling thread is not allowed to access members. *

* The default policy is to allow access to PUBLIC members, as well * as access to classes that have the same class loader as the caller. * In all other cases, this method calls checkPermission * with the RuntimePermission("accessDeclaredMembers") * permission. *

* If this method is overridden, then a call to * super.checkMemberAccess cannot be made, * as the default implementation of checkMemberAccess * relies on the code being checked being at a stack depth of * 4. * * @param clazz the class that reflection is to be performed on. * * @param which type of access, PUBLIC or DECLARED. * * @exception SecurityException if the caller does not have * permission to access members. * @exception NullPointerException if the clazz argument is * null. * @see java.lang.reflect.Member * @since JDK1.1 * @see #checkPermission(java.security.Permission) checkPermission */ public void checkMemberAccess(java.lang.Class clazz, int which) { } /** * Determines whether the permission with the specified permission target * name should be granted or denied. * *

If the requested permission is allowed, this method returns * quietly. If denied, a SecurityException is raised. * *

This method creates a SecurityPermission object for * the given permission target name and calls checkPermission * with it. * *

See the documentation for * {@link java.security.SecurityPermission} for * a list of possible permission target names. * *

If you override this method, then you should make a call to * super.checkSecurityAccess * at the point the overridden method would normally throw an * exception. * * @param target the target name of the SecurityPermission. * * @exception SecurityException if the calling thread does not have * permission for the requested access. * @exception NullPointerException if target is null. * @exception IllegalArgumentException if target is empty. * * @since JDK1.1 * @see #checkPermission(java.security.Permission) checkPermission */ public void checkSecurityAccess(java.lang.String target) { } /** * Returns the thread group into which to instantiate any new * thread being created at the time this is being called. * By default, it returns the thread group of the current * thread. This should be overridden by a specific security * manager to return the appropriate thread group. * * @return ThreadGroup that new threads are instantiated into * @since JDK1.1 * @see java.lang.ThreadGroup */ public java.lang.ThreadGroup getThreadGroup() { return null; } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy