
META-INF.es4x-commands.security.policy Maven / Gradle / Ivy
The newest version!
// Grant the following permissions to code that shall be executed from
// the node_modules/.lib/* directory
grant codeBase "file:\${user.dir}\${/}node_modules\${/}.lib\${/}*" {
// vert.x will need full access to the temp dir.
permission java.io.FilePermission "\${java.io.tmpdir}\${/}-", "read,write,delete";
// the code should be able to read the JVM/GraalVM runtime libs
permission java.io.FilePermission "\${java.home}", "read";
permission java.io.FilePermission "\${java.home}\${/}..\${/}release", "read";
permission java.io.FilePermission "\${java.home}\${/}-", "read";
// applications are allowed to read all files from the CWD
permission java.io.FilePermission "\${user.dir}\${/}-", "read";
// uncomment the following to allow full read access
//permission java.io.FilePermission "<>", "read";
// Netty performs some reflection we need to allow it
permission java.lang.reflect.ReflectPermission "suppressAccessChecks";
// By default we allow all runtime permissions
// users may want to restrict this further say for example to
// deny access to environment variables, etc...
permission java.lang.RuntimePermission "*";
// ES4X setup a nice looking logger
permission java.util.logging.LoggingPermission "control";
// Allow full access to JVM system properties
permission java.util.PropertyPermission "*", "read,write";
// currently we allow all access to the network
permission java.net.SocketPermission "*", "accept,connect,listen,resolve";
};
© 2015 - 2025 Weber Informatics LLC | Privacy Policy