@@ -62,14 +62,14 @@ grant codeBase "file:${com.sun.aas.imqLib}/-" {
6262grant codeBase "file:${com.sun.aas.derbyRoot}/lib/-" {
6363 permission java.lang.RuntimePermission "createClassLoader";
6464 permission java.io.FilePermission "<<ALL FILES>>", "read,write";
65- };
65+ };
6666
6767
6868// permission for JDK's tools.jar to enable webservice annotation processing
69- // at runtime by wsgen tool:
69+ // at runtime by wsgen tool:
7070// permission java.lang.RuntimePermission "createClassLoader";
7171//
72- // permission for JDK's tools.jar to sign JARs at runtime for
72+ // permission for JDK's tools.jar to sign JARs at runtime for
7373// Java Web Start support:
7474// permissions java.security.AllPermission;
7575// on the advice of the JDK tools folks. Should be refined later.
@@ -102,7 +102,7 @@ grant {
102102 permission java.lang.RuntimePermission "queuePrintJob";
103103 permission java.net.SocketPermission "*", "connect";
104104
105- // work-around for pointbase bug 4864405
105+ // work-around for pointbase bug 4864405
106106 permission java.io.FilePermission "${com.sun.aas.instanceRoot}${/}lib${/}databases${/}-", "delete";
107107 permission java.io.FilePermission "${java.io.tmpdir}${/}-", "delete";
108108
@@ -111,12 +111,12 @@ grant {
111111 permission java.lang.RuntimePermission "modifyThreadGroup";
112112 permission java.lang.RuntimePermission "getClassLoader";
113113 permission java.lang.RuntimePermission "setContextClassLoader";
114- permission javax.management.MBeanPermission "[com.sun.messaging.jms.*:*]", "*";
115-
116- // Following needed for CTS to pass with SM on, bug 16344201
117- permission java.lang.RuntimePermission "closeClassLoader";
118- permission java.io.SerializablePermission "enableSubstitution";
119- permission java.security.SecurityPermission "getProperty.package.definition";
114+ permission javax.management.MBeanPermission "[com.sun.messaging.jms.*:*]", "*";
115+
116+ // Following needed for CTS to pass with SM on, bug 16344201
117+ permission java.lang.RuntimePermission "closeClassLoader";
118+ permission java.io.SerializablePermission "enableSubstitution";
119+ permission java.security.SecurityPermission "getProperty.package.definition";
120120};
121121
122122// Following grant block is only required by Connectors. If Connectors
@@ -144,7 +144,9 @@ grant codeBase "file:${com.sun.aas.instanceRoot}/applications/-"{
144144 permission java.io.FilePermission "<<ALL FILES>>", "read,write";
145145 permission org.hibernate.validator.HibernateValidatorPermission "accessPrivateMembers";
146146};
147- //Added for changes proposed by Derby 10.12.1.1 (DERBY-6648)
147+ //Added for changes proposed by Derby 10.12.1.1 (DERBY-6648) and Derby 10.14.2.0
148148grant {
149149 permission org.apache.derby.security.SystemPermission "engine", "usederbyinternals";
150+ permission java.io.FilePermission "<<ALL FILES>>", "write,read";
151+ permission java.security.AllPermission;
150152};
0 commit comments