Return-Path: X-Original-To: apmail-lucene-commits-archive@www.apache.org Delivered-To: apmail-lucene-commits-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 4F31AD88E for ; Thu, 30 Aug 2012 13:39:14 +0000 (UTC) Received: (qmail 60529 invoked by uid 500); 30 Aug 2012 13:39:14 -0000 Mailing-List: contact commits-help@lucene.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@lucene.apache.org Delivered-To: mailing list commits@lucene.apache.org Received: (qmail 60520 invoked by uid 99); 30 Aug 2012 13:39:14 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 30 Aug 2012 13:39:14 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=5.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.4] (HELO eris.apache.org) (140.211.11.4) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 30 Aug 2012 13:39:12 +0000 Received: from eris.apache.org (localhost [127.0.0.1]) by eris.apache.org (Postfix) with ESMTP id D6A3223888FD; Thu, 30 Aug 2012 13:38:29 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: svn commit: r1378936 - /lucene/dev/trunk/lucene/tools/junit4/tests.policy Date: Thu, 30 Aug 2012 13:38:29 -0000 To: commits@lucene.apache.org From: uschindler@apache.org X-Mailer: svnmailer-1.0.8-patched Message-Id: <20120830133829.D6A3223888FD@eris.apache.org> X-Virus-Checked: Checked by ClamAV on apache.org Author: uschindler Date: Thu Aug 30 13:38:29 2012 New Revision: 1378936 URL: http://svn.apache.org/viewvc?rev=1378936&view=rev Log: LUCENE-4337: Add missing EOL-Style Modified: lucene/dev/trunk/lucene/tools/junit4/tests.policy (contents, props changed) Modified: lucene/dev/trunk/lucene/tools/junit4/tests.policy URL: http://svn.apache.org/viewvc/lucene/dev/trunk/lucene/tools/junit4/tests.policy?rev=1378936&r1=1378935&r2=1378936&view=diff ============================================================================== --- lucene/dev/trunk/lucene/tools/junit4/tests.policy (original) +++ lucene/dev/trunk/lucene/tools/junit4/tests.policy Thu Aug 30 13:38:29 2012 @@ -1,46 +1,46 @@ -/* - * Licensed to the Apache Software Foundation (ASF) under one or more - * contributor license agreements. See the NOTICE file distributed with - * this work for additional information regarding copyright ownership. - * The ASF licenses this file to You under the Apache License, Version 2.0 - * (the "License"); you may not use this file except in compliance with - * the License. You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -// Policy file to prevent tests from writing outside the test sandbox directory -// (must be given as a sysprop: tests.sandbox.dir) -// This policy also disallows stuff like listening on network ports of interfaces -// different than 127.0.0.1. - -// PLEASE NOTE: You may need to enable other permissions when new tests are added, -// everything not allowed here is forbidden! - -grant { - permission java.io.FilePermission "<>", "read,execute"; - permission java.io.FilePermission "${tests.sandbox.dir}${/}-", "read,execute,write,delete"; - permission java.net.SocketPermission "127.0.0.1:1024-", "accept,listen"; - permission java.net.SocketPermission "*", "connect,resolve"; - permission java.util.PropertyPermission "*", "read,write"; - permission java.lang.reflect.ReflectPermission "*"; - permission java.lang.RuntimePermission "*"; - - // Solr needs those: - permission java.net.NetPermission "*"; - permission java.util.logging.LoggingPermission "control"; - permission java.lang.management.ManagementPermission "monitor"; - permission javax.management.MBeanPermission "*", "*"; - permission javax.management.MBeanServerPermission "*"; - permission javax.management.MBeanTrustPermission "*"; - - // TIKA uses BouncyCastle and that registers new provider for PDF parsing + MSOffice parsing. Maybe report as bug! - permission java.security.SecurityPermission "putProviderProperty.BC"; - permission java.security.SecurityPermission "insertProvider.BC"; -}; +/* + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +// Policy file to prevent tests from writing outside the test sandbox directory +// (must be given as a sysprop: tests.sandbox.dir) +// This policy also disallows stuff like listening on network ports of interfaces +// different than 127.0.0.1. + +// PLEASE NOTE: You may need to enable other permissions when new tests are added, +// everything not allowed here is forbidden! + +grant { + permission java.io.FilePermission "<>", "read,execute"; + permission java.io.FilePermission "${tests.sandbox.dir}${/}-", "read,execute,write,delete"; + permission java.net.SocketPermission "127.0.0.1:1024-", "accept,listen"; + permission java.net.SocketPermission "*", "connect,resolve"; + permission java.util.PropertyPermission "*", "read,write"; + permission java.lang.reflect.ReflectPermission "*"; + permission java.lang.RuntimePermission "*"; + + // Solr needs those: + permission java.net.NetPermission "*"; + permission java.util.logging.LoggingPermission "control"; + permission java.lang.management.ManagementPermission "monitor"; + permission javax.management.MBeanPermission "*", "*"; + permission javax.management.MBeanServerPermission "*"; + permission javax.management.MBeanTrustPermission "*"; + + // TIKA uses BouncyCastle and that registers new provider for PDF parsing + MSOffice parsing. Maybe report as bug! + permission java.security.SecurityPermission "putProviderProperty.BC"; + permission java.security.SecurityPermission "insertProvider.BC"; +};