public class RemoteClassLoadingPermission extends BasicPermission
RMIClassLoaderSpi
instances that
implement net.jini.loader.ClassLoading.SafeUnmarshalling
check
before loading class files from a downloaded codebase, that the codebase's
ProtectionDomain is permitted to load classes.
This functionality is limited to JERI and not supported by JRMP.
Note that a lack of this permission doesn't prevent loading interfaces.
For that reason, static field initializers may be run, however interfaces
are not permitted to use static initializer blocks, so cannot throw an
exception such as ThreadDeath directly, or call privileged methods
as a ProtectionDomain
representing the untrusted
interface is present in the current execution context
AccessControlContext
.
It is recommended for this permission to be granted to code Signers, or be granted after proxy preparation.
If this permission is to be granted after proxy preparation, a jar file
can declare the permissions it needs granted during proxy preparation, see
AdvisoryDynamicPermissions
.
Users who want to disable this security check should use a wildcard "*" grant statement in their security policy file:
grant{
permission net.jini.loader.RemoteClassLoadingPermission "*";
};
Uses BasicPermission hierarchical naming conventions and wild card rules.
Constructor and Description |
---|
RemoteClassLoadingPermission(String name) |
equals, getActions, hashCode, implies, newPermissionCollection
checkGuard, getName, toString
public RemoteClassLoadingPermission(String name)
Copyright 2007-2013, multiple authors.
Licensed under the Apache License, Version 2.0, see the NOTICE file for attributions.