Return-Path: Delivered-To: apmail-incubator-river-dev-archive@minotaur.apache.org Received: (qmail 21849 invoked from network); 14 Feb 2010 17:54:13 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 14 Feb 2010 17:54:13 -0000 Received: (qmail 96534 invoked by uid 500); 14 Feb 2010 17:54:13 -0000 Delivered-To: apmail-incubator-river-dev-archive@incubator.apache.org Received: (qmail 96486 invoked by uid 500); 14 Feb 2010 17:54:13 -0000 Mailing-List: contact river-dev-help@incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: river-dev@incubator.apache.org Delivered-To: mailing list river-dev@incubator.apache.org Received: (qmail 96476 invoked by uid 99); 14 Feb 2010 17:54:13 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 14 Feb 2010 17:54:13 +0000 X-ASF-Spam-Status: No, hits=1.2 required=10.0 tests=SPF_NEUTRAL X-Spam-Check-By: apache.org Received-SPF: neutral (athena.apache.org: local policy) Received: from [61.9.189.146] (HELO nschwmtas04p.mx.bigpond.com) (61.9.189.146) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 14 Feb 2010 17:54:05 +0000 Received: from nschwotgx02p.mx.bigpond.com ([61.9.223.241]) by nschwmtas04p.mx.bigpond.com with ESMTP id <20100214175342.OSME1835.nschwmtas04p.mx.bigpond.com@nschwotgx02p.mx.bigpond.com> for ; Sun, 14 Feb 2010 17:53:42 +0000 Received: from [10.1.1.2] (really [61.9.223.241]) by nschwotgx02p.mx.bigpond.com with ESMTP id <20100214175342.RAIR19767.nschwotgx02p.mx.bigpond.com@[10.1.1.2]> for ; Sun, 14 Feb 2010 17:53:42 +0000 Message-ID: <4B78387C.7040203@zeus.net.au> Date: Mon, 15 Feb 2010 03:53:00 +1000 From: Peter Firmstone User-Agent: Thunderbird 2.0.0.14 (X11/20080531) MIME-Version: 1.0 To: river-dev@incubator.apache.org Subject: Re: servlet based JERI References: <4B72A683.7090104@qcg.nl> <4B7439F9.9010905@qcg.nl> <4B77E3BF.9080902@qcg.nl> In-Reply-To: <4B77E3BF.9080902@qcg.nl> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-RPD-ScanID: Class unknown; VirusThreatLevel unknown, RefID str=0001.0A150205.4B7838A6.006D,ss=1,fgs=0 First use this tool to log the required set of permissions: com.sun.jini.tool.DebugDynamicPolicyProvider Then checkPermissions() can check against the required permission using PermissionCollection.implies(), any party that doesn't have the required minimum permissions, gets a SecurityException. Remember, PermissionCollection.implies() doesn't have to match the exact same permission, just one that implies the required permission. Cheers, Peter. Sim IJskes - QCG wrote: > > > Does anybody have a suggestion, what kind of permission we want to > test in ListenEndpoint.checkPermissions() ? > > Bearing in mind, it will most probably be deployed from a .war and > runs in its own webapp classloader. > > Gr. Sim >