[External] : Re: JEP411: Missing use-case: Monitoring / restricting libraries
Peter Firmstone
peter.firmstone at zeus.net.au
Thu May 6 06:17:22 UTC 2021
On 21/04/2021 10:38 pm, Ron Pressler wrote:
>
> There is no argument that this is a powerful capability *in theory*;
> the problem is that it’s difficult to correctly employ this capability
> correctly *in practice*. See
> this paper for an empirical study:
> http://www.cs.cmu.edu/~clegoues/docs/coker15acsac.pdf
> <http://www.cs.cmu.edu/~clegoues/docs/coker15acsac.pdf>
>
It's a shame the authors weren't able to study an application that
really ran the security manager through it's paces. They do exist, for
example Apache River isn't on the list, neither is Rio or Sorcer.
These certainly aren't perfect, my project on github, JGDMS was created
to demonstrate the security fixes for issues in Apache River, to
convince users who were not receptive to addressing security problems.
I've added it here since security seems to be a popular discussion
point, so that I can show where SecurityManager, AccessController,
Policy etc, fit into our overarching security model.
Back when Apache inherited the Jini source code from Sun Microsystems,
the designers had made the assumption that Java Serialization was
secure, due to the sandbox. Maybe Java Serialization and the sandbox
should have been securem but like most things they were designed with
flaw's. One of the problems was that security was added in Jini 2.0,
while Jini 1.0 had no security at all. At that time security was bolted
on feature and hadn't been completed when it shipped.
So on the assumption that Java had a secure sandbox, the Jini developers
allowed code to be downloaded dynamically, then data deserialized into
it, then they would check to see if the proxy was valid using a
mechanism called proxy trust, where the asked the remote end to validate
the proxy. They did have TLS connections, and they had constraints to
ensure that you didn't use an insecure connection, however the problem
was, these things were applied after downloading and deserializing!
The other problem was that the calling Subject wasn't always preserved
over threads, so code using secure connections didn't work the same as
insecure TCP connections.
I think you can see the problem here and I think this is the problem
people are talking about when they are talking about sandboxes.
I have spent years refactoring this code from the ground up, while
trying to maintain backward compatibility as best as possible. If you
think Java developers are fussy about backward compatibility, you
haven't met a Jini or Javaspace developer, but I can't blame them
because they were subject to the horrors of Java Serialization and code
written prior to the Java Memory Model that shipped with Java 5.
So security was broken, I took it upon myself to fix it, and the users
didn't believe it was broken or insecure as they had drunk the sandbox
coolaid, this is why I don't talk about sandboxing. One user even
suggested that I use the broken ProxyTrust security mechanism to fix the
security issues. At that time before 2010, it wasn't common knowledge
among developers that Java Serialization was insecure, there were some
reports, and IBM had discussed and published information on
whitelisting, or look ahead serialization.
I had to redesign the system, but still allow it to run insecurely for
testing or for users who used it behind firewalls and didn't want
security features. It had been originally designed to be configurable,
such that it can be configured secure, or configured insecure, and it's
quite obvious which is which. It doesn't use configuration files, but
instead a Java syntax or Groovy.
I won't go into all the things that were required for security, but I
will say that now a TLS connection is made first (with both client and
server authentication), then we download the code, dynamically grant
permissions to it, then de-serialize into it the ClassLoader created for
it, that ClassLoader remains with the communication endpoint and makes
all class resolution decisions. We don't use Java Serialization anymore
either, instead we use constructors with a caller sensitive parameter,
that's been discussed here previously, but it is capable of checking
intra object invariants.
So we don't rely on sandboxing, or the sandbox, but we authenticate,
validate and limit permissions to the principle of least privilege, as
part of an overarching security strategy.
Here's an example of the requested permissions in downloaded code (note
JRMP is only there for backward compatibility, it is deprecated).
https://github.com/pfirmstone/JGDMS/blob/trunk/JGDMS/services/reggie/reggie-dl/src/main/resources/META-INF/PERMISSIONS.LIST
You can see from the attached file it was granted very few permissions
at runtime (in case anyone is wondering the md5 checksum is deprecated,
but still used in the test suite):
All these permissions were granted dynamically, they didn't exist prior
to the connection with the remote server, they don't exist in a policy
file, policy files used don't often require editing.
grant codebase
"httpmd://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar;md5=a28068d398d636dd8fbeace7df8faa77"
{
permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080",
"connect,resolve";
};
grant codebase
"httpmd://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar;md5=a28068d398d636dd8fbeace7df8faa77",
principal javax.security.auth.x500.X500Principal "CN=Tester"
{
permission javax.security.auth.AuthPermission "getSubject";
permission org.apache.river.api.io.DeSerializationPermission
"MARSHALL";
permission net.jini.security.AuthenticationPermission
"javax.security.auth.x500.X500Principal \"CN=Tester\" peer
javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
permission net.jini.security.AuthenticationPermission
"javax.security.auth.x500.X500Principal \"CN=Tester\" peer
javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
permission net.jini.security.AuthenticationPermission
"javax.security.auth.x500.X500Principal \"CN=Tester\" peer
javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080",
"connect,resolve";
permission java.net.SocketPermission
"[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
permission java.net.SocketPermission
"[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
permission java.util.PropertyPermission
"org.apache.river.reggie.enableImplToStubReplacement", "read";
};
Prior to downloading and after authentication, a permission called
DownloadPermission, which should really be called ClassLoadingPermission
is granted dynamically, as well as permission to connect to the remote
network endpoint as well as a URLPermission. These aren't shown here as
they are part of the ProtectionDomain's permission list. It's a given
that these will be granted dynamically when a ClassLoader is created to
load the code. Then the permissions in the PERMISSIONS.LIST file will
be granted after class loading, if the user or calling code has
GrantPermission to do so. A UI may also be included that provides a
user interface for users to interact with the service.
So as you can see, we don't rely on the sandbox and we don't trust Java
Serialization. We have our own serialization implementation, we haven't
disabled Java serialization, but it is recommended the user do so with a
global filter.
It may sound complex, but it is an automated process with tools that
allow it to occur.
The code doesn't require many permissions to run, so it isn't given any
more than needed.
Once the SecurityManager has been removed, I'm assuming that the
downloaded code from our trusted third party, will be able to access
files and data should they want to, anything the process has access to
at least. Of course there are a lot of places in our API's where
security checks occur and these would no longer restrict access.
This is why I refer to SecurityManager an access control mechanism and I
don't refer to it a sandbox. It is a very good access control mechanism
and it supplements type safety, class verification, object encapsulation.
It is part of our overarching security infrastructure, but most
certainly by itself, it is not responsible for security.
Our system is dynamic, the problems mentioned regarding library changes
are not an issue, these are simply updated when a new library (or a new
version of Java) is deployed.
I hope this helps provide an understanding.
For those that aren't aware, Jini was meant to allow Java to cluster
dynamically, to dynamically discover services in the network, now people
then didn't get it, but it's very similar to microservices. Javaspaces
is a distributed database. There were problems with IPv4 and NAT (Jini
requires end to end connectivity, not a publish subscribe model),
security and complexity that prevented Jini from taking off. Today all
these problems are solved, you'll notice we use IPv6 for end to end
connectivity.
So we have all these tools built on top of Java that allow you to do
security properly. Java 1.4 Security implementations were actually
changed to allow Dynamic Permission's for Jini.
Sun owned the copyright, I think Oracle may still do so, it was donated
under the Apache 2.0 License, I have kept the code change history going
back to the original donation, I would certainly donate anything I have
done to OpenJDK (and I am responsible for the majority of the security
changes), should they wish to use it, it would require Oracle to donate
the original code as GPL to OpenJDK.
The easiest way of thinking about it, is it's the glue that ties
together multiple JVM's on multiple servers to act as a single system,
that discovers components dynamically as they are added and upgraded.
It is an extremely capable and well designed system, now that the major
issues have been solved. Every thing is POJO domain driven design in Java.
There's a common misconception it uses RMI, it doesn't, it uses
something far better.
Distributed Object garbage collection works (properly without race
conditions) over secure network connections and user Subjects are
preserved over network calls. RMI doesn't have that capability, it's
also extensible, so it can use different communication layers, different
serialization layers, different transport layers, it's all configurable
and pluggable. Using IPv6, it can also communicate and discovery
globally, so a system can be spread around different part of the world
and tie together into one system.
It's scalable and damn fast too, while it does block waiting for network
replies, it doesn't have any hotspots, the hotspot's are all Java
platform code :)
https://pfirmstone.github.io/JGDMS/old-static-site/images/River-internet_mahalo_randomStressTest.PNG
(This old screenshot is back when we were still using Java
Serialization. I'll have to do a comparison for with secure code, this
was using unsecured communication.) Today we use the latest TLSv1.3
features and protocols.
You could say it was the first IoT, but now, it is far more powerful,
more secure and capable than IoT. We've had 20 years to figure it out.
It is still under active development. The current focus is a public
Serialization API that will work with Java's module system, without
breaking Object encapsulation. Although part of this depends on
SecurityManager Permissions.
Once SecurityManager is removed, that is the last version of Java we
will support, we will no longer be able stay with you until we figure
out how to fix access control, however I fear that this functionality
can only be provided at the Java platform level. This is basically a
toolkit, most users are developers from large corporations who don't
publicly share their implementations, but there are a few:
http://river.apache.org/user-doc/success-stories.html
--
Regards,
Peter Firmstone
Zeus Project Services Pty Ltd.
-------------- next part --------------
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/qa/lib/jinitests.jar",
principal javax.security.auth.x500.X500Principal "CN=Tester"
{
permission javax.security.auth.AuthPermission "getSubject";
permission org.apache.river.api.io.DeSerializationPermission "MARSHALL";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\java", "execute";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\reggie-dl-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\reggie\\reggie.config", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\starter\\starter.config", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultnonactvm.policy", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultsecurereggie.policy", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\dynamic-policy.properties", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\jsselogins", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\phoenix.keystore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\reggie.keystore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\tester.keystore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\truststore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\nonactivatablegroup-dl.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\qa1-lookupservice-dl.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\resources\\jinitest.policy", "read";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
permission net.jini.security.GrantPermission "net.jini.security.AuthenticationPermission \"javax.security.auth.x500.X500Principal \\\"CN=Tester\\\" peer javax.security.auth.x500.X500Principal \\\"CN=Reggie\\\"\", \"connect\";";
permission java.net.SocketPermission "DESKTOP-R0ORPA2", "resolve";
permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4506", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4509", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4510", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4529", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4530", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4532", "accept,resolve";
permission java.net.SocketPermission "localhost:0", "listen,resolve";
permission java.net.SocketPermission "localhost:9080", "listen,resolve";
permission java.net.SocketPermission "localhost:9081", "listen,resolve";
permission java.net.SocketPermission "localhost:9082", "listen,resolve";
permission java.util.PropertyPermission "/", "read";
permission java.util.PropertyPermission "HOST", "read";
permission java.util.PropertyPermission "activation.jar", "read";
permission java.util.PropertyPermission "bouncy-jce.jar", "read";
permission java.util.PropertyPermission "bouncy-jsse.jar", "read";
permission java.util.PropertyPermission "classserver.jar", "read";
permission java.util.PropertyPermission "collections.jar", "read";
permission java.util.PropertyPermission "destroy.jar", "read";
permission java.util.PropertyPermission "disco.jar", "read";
permission java.util.PropertyPermission "fiddler-dl.jar", "read";
permission java.util.PropertyPermission "fiddler.jar", "read";
permission java.util.PropertyPermission "file.ext", "read";
permission java.util.PropertyPermission "globalclasspath", "read";
permission java.util.PropertyPermission "group.jar", "read";
permission java.util.PropertyPermission "high-scale-lib.jar", "read";
permission java.util.PropertyPermission "java.class.path", "read";
permission java.util.PropertyPermission "java.home", "read";
permission java.util.PropertyPermission "java.rmi.server.codebase", "read";
permission java.util.PropertyPermission "java.util.logging.config.file", "read";
permission java.util.PropertyPermission "jeri.jar", "read";
permission java.util.PropertyPermission "jgdms-rmi-tls.jar", "read";
permission java.util.PropertyPermission "jiniClassServer.adminName", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.dir", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.dir.0", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.impl", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.impl.0", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.port", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.port.0", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "jiniClassServer.dir", "read";
permission java.util.PropertyPermission "jiniClassServer.dir.0", "read";
permission java.util.PropertyPermission "jiniClassServer.impl", "read";
permission java.util.PropertyPermission "jiniClassServer.impl.0", "read";
permission java.util.PropertyPermission "jiniClassServer.port", "read";
permission java.util.PropertyPermission "jiniClassServer.port.0", "read";
permission java.util.PropertyPermission "jiniClassServer.serverjvmargs", "read";
permission java.util.PropertyPermission "jiniClassServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "jiniClassServer.transient.impl", "read";
permission java.util.PropertyPermission "jiniClassServer.type", "read";
permission java.util.PropertyPermission "jiniClassServer.type.0", "read";
permission java.util.PropertyPermission "jiniClassServer.type.1", "read";
permission java.util.PropertyPermission "jsk-dl.jar", "read";
permission java.util.PropertyPermission "jsk-lib.jar", "read";
permission java.util.PropertyPermission "jsk.iiop.jar", "read";
permission java.util.PropertyPermission "jsk.jrmp.jar", "read";
permission java.util.PropertyPermission "jsk.pref.jar", "read";
permission java.util.PropertyPermission "jsk.url.jar", "read";
permission java.util.PropertyPermission "loader.jar", "read";
permission java.util.PropertyPermission "mahalo-dl.jar", "read";
permission java.util.PropertyPermission "mahalo.jar", "read";
permission java.util.PropertyPermission "mercury-dl.jar", "read";
permission java.util.PropertyPermission "mercury.jar", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.adminName", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.impl", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.instances", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.1", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.1", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.1", "read";
permission java.util.PropertyPermission "net.jini.discovery.announce", "read";
permission java.util.PropertyPermission "nonActivatableGroup.adminName", "read";
permission java.util.PropertyPermission "nonActivatableGroup.classpath", "read";
permission java.util.PropertyPermission "nonActivatableGroup.classpath.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.codebase", "read";
permission java.util.PropertyPermission "nonActivatableGroup.codebase.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.impl", "read";
permission java.util.PropertyPermission "nonActivatableGroup.impl.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.integrityhash", "read";
permission java.util.PropertyPermission "nonActivatableGroup.integrityhash.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.policyfile", "read";
permission java.util.PropertyPermission "nonActivatableGroup.policyfile.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvm", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvm.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.transient.impl", "read";
permission java.util.PropertyPermission "nonActivatableGroup.type", "read";
permission java.util.PropertyPermission "nonActivatableGroup.type.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.type.1", "read";
permission java.util.PropertyPermission "norm-dl.jar", "read";
permission java.util.PropertyPermission "norm.jar", "read";
permission java.util.PropertyPermission "org.apache.river.jsk.home", "read";
permission java.util.PropertyPermission "org.apache.river.jsk.port", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9080", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9081", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.globalvmargs", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.integrityhash", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.runjiniserver", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.runkitserver", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.securityproperties", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.serviceMode", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.shared", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.startDelay", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.testClassServer", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.testhosts", "read";
permission java.util.PropertyPermission "org.apache.river.qa.home", "read";
permission java.util.PropertyPermission "org.apache.river.qa.port", "read";
permission java.util.PropertyPermission "org.apache.river.test.home", "read";
permission java.util.PropertyPermission "org.apache.river.test.port", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actClasspath", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actCodebase", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntLeaseExp", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntNotify", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTListener", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTSrvcLeaseExp", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.nInstancesPerClass", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.outputRoot", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.policy", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.rmiCodebase", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.selectMethod", "read";
permission java.util.PropertyPermission "outrigger-dl.jar", "read";
permission java.util.PropertyPermission "outrigger-snaplogstore.jar", "read";
permission java.util.PropertyPermission "outrigger.jar", "read";
permission java.util.PropertyPermission "phoenix-common.jar", "read";
permission java.util.PropertyPermission "phoenix-dl.jar", "read";
permission java.util.PropertyPermission "phoenix-group.jar", "read";
permission java.util.PropertyPermission "phoenix-init.jar", "read";
permission java.util.PropertyPermission "phoenix.jar", "read";
permission java.util.PropertyPermission "platform.jar", "read";
permission java.util.PropertyPermission "policy.writer.jar", "read";
permission java.util.PropertyPermission "qaClassServer.adminName", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.dir", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.dir.0", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.impl", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.impl.0", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.port", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.port.0", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "qaClassServer.dir", "read";
permission java.util.PropertyPermission "qaClassServer.dir.0", "read";
permission java.util.PropertyPermission "qaClassServer.impl", "read";
permission java.util.PropertyPermission "qaClassServer.impl.0", "read";
permission java.util.PropertyPermission "qaClassServer.port", "read";
permission java.util.PropertyPermission "qaClassServer.port.0", "read";
permission java.util.PropertyPermission "qaClassServer.serverjvmargs", "read";
permission java.util.PropertyPermission "qaClassServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "qaClassServer.transient.impl", "read";
permission java.util.PropertyPermission "qaClassServer.type", "read";
permission java.util.PropertyPermission "qaClassServer.type.0", "read";
permission java.util.PropertyPermission "qaClassServer.type.1", "read";
permission java.util.PropertyPermission "reggie-dl.jar", "read";
permission java.util.PropertyPermission "reggie.jar", "read";
permission java.util.PropertyPermission "river.version", "read";
permission java.util.PropertyPermission "start.jar", "read";
permission java.util.PropertyPermission "testClassServer.adminName", "read";
permission java.util.PropertyPermission "testClassServer.classServer.dir", "read";
permission java.util.PropertyPermission "testClassServer.classServer.dir.0", "read";
permission java.util.PropertyPermission "testClassServer.classServer.impl", "read";
permission java.util.PropertyPermission "testClassServer.classServer.impl.0", "read";
permission java.util.PropertyPermission "testClassServer.classServer.port", "read";
permission java.util.PropertyPermission "testClassServer.classServer.port.0", "read";
permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs", "read";
permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "testClassServer.dir", "read";
permission java.util.PropertyPermission "testClassServer.dir.0", "read";
permission java.util.PropertyPermission "testClassServer.impl", "read";
permission java.util.PropertyPermission "testClassServer.impl.0", "read";
permission java.util.PropertyPermission "testClassServer.port", "read";
permission java.util.PropertyPermission "testClassServer.port.0", "read";
permission java.util.PropertyPermission "testClassServer.serverjvmargs", "read";
permission java.util.PropertyPermission "testClassServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "testClassServer.transient.impl", "read";
permission java.util.PropertyPermission "testClassServer.type", "read";
permission java.util.PropertyPermission "testClassServer.type.0", "read";
permission java.util.PropertyPermission "testClassServer.type.1", "read";
permission java.util.PropertyPermission "user.dir", "read";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/qa/lib/jiniharness.jar",
principal javax.security.auth.x500.X500Principal "CN=Tester"
{
permission javax.security.auth.AuthPermission "getSubject";
permission java.lang.RuntimePermission "exitVM.0";
permission org.apache.river.api.io.DeSerializationPermission "MARSHALL";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\java", "execute";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\reggie-dl-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\reggie\\reggie.config", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\starter\\starter.config", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultnonactvm.policy", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultsecurereggie.policy", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\dynamic-policy.properties", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\jsselogins", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\phoenix.keystore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\reggie.keystore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\tester.keystore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\truststore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\nonactivatablegroup-dl.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\qa1-lookupservice-dl.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\resources\\jinitest.policy", "read";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
permission net.jini.security.GrantPermission "net.jini.security.AuthenticationPermission \"javax.security.auth.x500.X500Principal \\\"CN=Tester\\\" peer javax.security.auth.x500.X500Principal \\\"CN=Reggie\\\"\", \"connect\";";
permission java.net.SocketPermission "DESKTOP-R0ORPA2", "resolve";
permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4506", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4509", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4510", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4529", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4530", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4532", "accept,resolve";
permission java.net.SocketPermission "localhost:0", "listen,resolve";
permission java.net.SocketPermission "localhost:9080", "listen,resolve";
permission java.net.SocketPermission "localhost:9081", "listen,resolve";
permission java.net.SocketPermission "localhost:9082", "listen,resolve";
permission java.util.PropertyPermission "/", "read";
permission java.util.PropertyPermission "HOST", "read";
permission java.util.PropertyPermission "activation.jar", "read";
permission java.util.PropertyPermission "bouncy-jce.jar", "read";
permission java.util.PropertyPermission "bouncy-jsse.jar", "read";
permission java.util.PropertyPermission "classserver.jar", "read";
permission java.util.PropertyPermission "collections.jar", "read";
permission java.util.PropertyPermission "destroy.jar", "read";
permission java.util.PropertyPermission "disco.jar", "read";
permission java.util.PropertyPermission "fiddler-dl.jar", "read";
permission java.util.PropertyPermission "fiddler.jar", "read";
permission java.util.PropertyPermission "file.ext", "read";
permission java.util.PropertyPermission "globalclasspath", "read";
permission java.util.PropertyPermission "group.jar", "read";
permission java.util.PropertyPermission "high-scale-lib.jar", "read";
permission java.util.PropertyPermission "java.class.path", "read";
permission java.util.PropertyPermission "java.home", "read";
permission java.util.PropertyPermission "java.rmi.server.codebase", "read";
permission java.util.PropertyPermission "java.util.logging.config.file", "read";
permission java.util.PropertyPermission "jeri.jar", "read";
permission java.util.PropertyPermission "jgdms-rmi-tls.jar", "read";
permission java.util.PropertyPermission "jiniClassServer.adminName", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.dir", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.dir.0", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.impl", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.impl.0", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.port", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.port.0", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "jiniClassServer.dir", "read";
permission java.util.PropertyPermission "jiniClassServer.dir.0", "read";
permission java.util.PropertyPermission "jiniClassServer.impl", "read";
permission java.util.PropertyPermission "jiniClassServer.impl.0", "read";
permission java.util.PropertyPermission "jiniClassServer.port", "read";
permission java.util.PropertyPermission "jiniClassServer.port.0", "read";
permission java.util.PropertyPermission "jiniClassServer.serverjvmargs", "read";
permission java.util.PropertyPermission "jiniClassServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "jiniClassServer.transient.impl", "read";
permission java.util.PropertyPermission "jiniClassServer.type", "read";
permission java.util.PropertyPermission "jiniClassServer.type.0", "read";
permission java.util.PropertyPermission "jiniClassServer.type.1", "read";
permission java.util.PropertyPermission "jsk-dl.jar", "read";
permission java.util.PropertyPermission "jsk-lib.jar", "read";
permission java.util.PropertyPermission "jsk.iiop.jar", "read";
permission java.util.PropertyPermission "jsk.jrmp.jar", "read";
permission java.util.PropertyPermission "jsk.pref.jar", "read";
permission java.util.PropertyPermission "jsk.url.jar", "read";
permission java.util.PropertyPermission "loader.jar", "read";
permission java.util.PropertyPermission "mahalo-dl.jar", "read";
permission java.util.PropertyPermission "mahalo.jar", "read";
permission java.util.PropertyPermission "mercury-dl.jar", "read";
permission java.util.PropertyPermission "mercury.jar", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.adminName", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.impl", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.instances", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.1", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.1", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.1", "read";
permission java.util.PropertyPermission "net.jini.discovery.announce", "read";
permission java.util.PropertyPermission "nonActivatableGroup.adminName", "read";
permission java.util.PropertyPermission "nonActivatableGroup.classpath", "read";
permission java.util.PropertyPermission "nonActivatableGroup.classpath.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.codebase", "read";
permission java.util.PropertyPermission "nonActivatableGroup.codebase.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.impl", "read";
permission java.util.PropertyPermission "nonActivatableGroup.impl.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.integrityhash", "read";
permission java.util.PropertyPermission "nonActivatableGroup.integrityhash.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.policyfile", "read";
permission java.util.PropertyPermission "nonActivatableGroup.policyfile.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvm", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvm.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.transient.impl", "read";
permission java.util.PropertyPermission "nonActivatableGroup.type", "read";
permission java.util.PropertyPermission "nonActivatableGroup.type.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.type.1", "read";
permission java.util.PropertyPermission "norm-dl.jar", "read";
permission java.util.PropertyPermission "norm.jar", "read";
permission java.util.PropertyPermission "org.apache.river.jsk.home", "read";
permission java.util.PropertyPermission "org.apache.river.jsk.port", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.callAutoT", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9080", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9081", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.globalvmargs", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.integrityhash", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.nSecsWaitDestroy", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.runjiniserver", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.runkitserver", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.securityproperties", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.serviceMode", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.shared", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.startDelay", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.testClassServer", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.testhosts", "read";
permission java.util.PropertyPermission "org.apache.river.qa.home", "read";
permission java.util.PropertyPermission "org.apache.river.qa.port", "read";
permission java.util.PropertyPermission "org.apache.river.test.home", "read";
permission java.util.PropertyPermission "org.apache.river.test.port", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actClasspath", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actCodebase", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntLeaseExp", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntNotify", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTListener", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTSrvcLeaseExp", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.nInstancesPerClass", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.outputRoot", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.policy", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.rmiCodebase", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.selectMethod", "read";
permission java.util.PropertyPermission "os.name", "read";
permission java.util.PropertyPermission "outrigger-dl.jar", "read";
permission java.util.PropertyPermission "outrigger-snaplogstore.jar", "read";
permission java.util.PropertyPermission "outrigger.jar", "read";
permission java.util.PropertyPermission "phoenix-common.jar", "read";
permission java.util.PropertyPermission "phoenix-dl.jar", "read";
permission java.util.PropertyPermission "phoenix-group.jar", "read";
permission java.util.PropertyPermission "phoenix-init.jar", "read";
permission java.util.PropertyPermission "phoenix.jar", "read";
permission java.util.PropertyPermission "platform.jar", "read";
permission java.util.PropertyPermission "policy.writer.jar", "read";
permission java.util.PropertyPermission "qaClassServer.adminName", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.dir", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.dir.0", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.impl", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.impl.0", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.port", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.port.0", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "qaClassServer.dir", "read";
permission java.util.PropertyPermission "qaClassServer.dir.0", "read";
permission java.util.PropertyPermission "qaClassServer.impl", "read";
permission java.util.PropertyPermission "qaClassServer.impl.0", "read";
permission java.util.PropertyPermission "qaClassServer.port", "read";
permission java.util.PropertyPermission "qaClassServer.port.0", "read";
permission java.util.PropertyPermission "qaClassServer.serverjvmargs", "read";
permission java.util.PropertyPermission "qaClassServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "qaClassServer.transient.impl", "read";
permission java.util.PropertyPermission "qaClassServer.type", "read";
permission java.util.PropertyPermission "qaClassServer.type.0", "read";
permission java.util.PropertyPermission "qaClassServer.type.1", "read";
permission java.util.PropertyPermission "reggie-dl.jar", "read";
permission java.util.PropertyPermission "reggie.jar", "read";
permission java.util.PropertyPermission "river.version", "read";
permission java.util.PropertyPermission "start.jar", "read";
permission java.util.PropertyPermission "testClassServer.adminName", "read";
permission java.util.PropertyPermission "testClassServer.classServer.dir", "read";
permission java.util.PropertyPermission "testClassServer.classServer.dir.0", "read";
permission java.util.PropertyPermission "testClassServer.classServer.impl", "read";
permission java.util.PropertyPermission "testClassServer.classServer.impl.0", "read";
permission java.util.PropertyPermission "testClassServer.classServer.port", "read";
permission java.util.PropertyPermission "testClassServer.classServer.port.0", "read";
permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs", "read";
permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "testClassServer.dir", "read";
permission java.util.PropertyPermission "testClassServer.dir.0", "read";
permission java.util.PropertyPermission "testClassServer.impl", "read";
permission java.util.PropertyPermission "testClassServer.impl.0", "read";
permission java.util.PropertyPermission "testClassServer.port", "read";
permission java.util.PropertyPermission "testClassServer.port.0", "read";
permission java.util.PropertyPermission "testClassServer.serverjvmargs", "read";
permission java.util.PropertyPermission "testClassServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "testClassServer.transient.impl", "read";
permission java.util.PropertyPermission "testClassServer.type", "read";
permission java.util.PropertyPermission "testClassServer.type.0", "read";
permission java.util.PropertyPermission "testClassServer.type.1", "read";
permission java.util.PropertyPermission "user.dir", "read";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/qa/lib/jiniharness.jar"
{
permission javax.security.auth.AuthPermission "createLoginContext.org.apache.river.Test";
permission javax.security.auth.AuthPermission "doAsPrivileged";
permission java.lang.RuntimePermission "getenv.SOUL";
permission java.lang.RuntimePermission "setIO";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\test.config", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\soul\\soul.202105041751026391", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\spec\\lookupservice\\test_set02\\org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
permission java.io.FilePermission "org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
permission java.security.SecurityPermission "createPolicy.JiniPolicy";
permission java.security.SecurityPermission "getPolicy";
permission java.security.SecurityPermission "setPolicy";
permission java.util.PropertyPermission "line.separator", "read";
permission java.util.PropertyPermission "loader.requireDlPerm", "read";
permission java.util.PropertyPermission "net.jini.discovery.announce", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.defaultTestConfig", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.testhosts", "read";
permission java.util.PropertyPermission "testConfiguration", "read";
permission java.util.PropertyPermission "testFailureAnalyzers", "read";
permission java.util.PropertyPermission "user.dir", "read";
permission java.util.logging.LoggingPermission "control";
};
grant codebase "jrt:/java.smartcardio"
{
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
permission java.security.SecurityPermission "putProviderProperty.SunPCSC";
};
grant codebase "httpmd://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar;md5=a28068d398d636dd8fbeace7df8faa77"
{
permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-pref-class-loader-3.1.1-SNAPSHOT.jar",
principal javax.security.auth.x500.X500Principal "CN=Tester"
{
permission javax.security.auth.AuthPermission "getSubject";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
};
grant codebase "httpmd://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar;md5=a28068d398d636dd8fbeace7df8faa77",
principal javax.security.auth.x500.X500Principal "CN=Tester"
{
permission javax.security.auth.AuthPermission "getSubject";
permission org.apache.river.api.io.DeSerializationPermission "MARSHALL";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
permission java.util.PropertyPermission "org.apache.river.reggie.enableImplToStubReplacement", "read";
};
grant codebase "jrt:/jdk.crypto.mscapi"
{
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
permission java.lang.RuntimePermission "loadLibrary.sunmscapi";
permission java.security.SecurityPermission "putProviderProperty.SunMSCAPI";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib-dl/jgdms-lib-dl-3.1.1-SNAPSHOT.jar"
{
permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-url-integrity-3.1.1-SNAPSHOT.jar",
principal javax.security.auth.x500.X500Principal "CN=Tester"
{
permission java.net.NetPermission "specifyStreamHandler";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\reggie-dl-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\nonactivatablegroup-dl.jar", "read";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-pref-class-loader-3.1.1-SNAPSHOT.jar"
{
permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "GET:";
permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar", "GET:";
permission java.lang.RuntimePermission "accessClassInPackage.jdk.internal.reflect";
permission java.lang.RuntimePermission "createClassLoader";
permission java.lang.RuntimePermission "getClassLoader";
permission java.net.SocketPermission "DESKTOP-R0ORPA2", "connect,accept,resolve";
permission java.util.PropertyPermission "java.rmi.server.codebase", "read";
permission java.util.PropertyPermission "net.jini.loader.codebaseAnnotation", "read";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-collections-3.1.1-SNAPSHOT.jar",
principal javax.security.auth.x500.X500Principal "CN=Tester"
{
permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
};
grant codebase "jrt:/java.security.jgss"
{
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
permission java.security.SecurityPermission "putProviderProperty.SunJGSS";
};
grant codebase "httpmd://DESKTOP-R0ORPA2:9080/jgdms-lib-dl-3.1.1-SNAPSHOT.jar;md5=c1233e711b1fc12d6df366839f425ebd"
{
permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-platform-3.1.1-SNAPSHOT.jar"
{
permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
permission org.apache.river.thread.ThreadPoolPermission "getUserThreadPool";
permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "GET:";
permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar", "GET:";
permission java.io.SerializablePermission "enableSubclassImplementation";
permission java.io.SerializablePermission "enableSubstitution";
permission org.apache.river.jeri.internal.EndpointInternalsPermission "set";
permission java.lang.reflect.ReflectPermission "suppressAccessChecks";
permission javax.security.auth.AuthPermission "createLoginContext.org.apache.river.Test";
permission javax.security.auth.AuthPermission "doAsPrivileged";
permission javax.security.auth.AuthPermission "getLoginConfiguration";
permission javax.security.auth.AuthPermission "getSubject";
permission javax.security.auth.AuthPermission "getSubjectFromDomainCombiner";
permission javax.security.auth.AuthPermission "modifyPrincipals";
permission javax.security.auth.AuthPermission "modifyPrivateCredentials";
permission javax.security.auth.AuthPermission "modifyPublicCredentials";
permission javax.security.auth.AuthPermission "setLoginConfiguration";
permission java.lang.RuntimePermission "accessClassInPackage.jdk.internal.reflect";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.jca";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.krb5";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.pkcs";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.provider";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util.math";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util.math.intpoly";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.x509";
permission java.lang.RuntimePermission "accessClassInPackage.sun.util.locale.provider";
permission java.lang.RuntimePermission "accessClassInPackage.sun.util.resources";
permission java.lang.RuntimePermission "accessDeclaredMembers";
permission java.lang.RuntimePermission "accessSystemModules";
permission java.lang.RuntimePermission "createClassLoader";
permission java.lang.RuntimePermission "createSecurityManager";
permission java.lang.RuntimePermission "getClassLoader";
permission java.lang.RuntimePermission "getProtectionDomain";
permission java.lang.RuntimePermission "getStackWalkerWithClassReference";
permission java.lang.RuntimePermission "getenv.SOUL";
permission java.lang.RuntimePermission "loadLibrary.net";
permission java.lang.RuntimePermission "loadLibrary.nio";
permission java.lang.RuntimePermission "loadLibrary.sunec";
permission java.lang.RuntimePermission "loadLibrary.sunmscapi";
permission java.lang.RuntimePermission "loadLibrary.zip";
permission java.lang.RuntimePermission "localeServiceProvider";
permission java.lang.RuntimePermission "loggerFinder";
permission java.lang.RuntimePermission "modifyThread";
permission java.lang.RuntimePermission "modifyThreadGroup";
permission java.lang.RuntimePermission "readFileDescriptor";
permission java.lang.RuntimePermission "reflectionFactoryAccess";
permission java.lang.RuntimePermission "setContextClassLoader";
permission java.lang.RuntimePermission "setIO";
permission java.lang.RuntimePermission "shutdownHooks";
permission java.lang.RuntimePermission "writeFileDescriptor";
permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
permission net.jini.io.context.ContextPermission "net.jini.io.context.ClientSubject.getClientSubject";
permission javax.security.auth.PrivateCredentialPermission "javax.security.auth.x500.X500PrivateCredential javax.security.auth.x500.X500Principal \"CN=Tester\"", "read";
permission java.net.NetPermission "getCookieHandler";
permission java.net.NetPermission "getNetworkInformation";
permission java.net.NetPermission "getProxySelector";
permission java.net.NetPermission "getResponseCache";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\net.dll", "read";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\nio.dll", "read";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\sunec.dll", "read";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\sunmscapi.dll", "read";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\zip.dll", "read";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\conf\\net.properties", "read";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\conf\\security\\policy\\unlimited", "read";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\conf\\security\\policy\\unlimited\\default_US_export.policy", "read";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\conf\\security\\policy\\unlimited\\default_local.policy", "read";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\lib\\security\\blacklisted.certs", "read";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\lib\\security\\cacerts", "read";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\lib\\tzdb.dat", "read";
permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp", "read";
permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache13530489763375062441.tmp", "delete";
permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache13530489763375062441.tmp", "read";
permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache13530489763375062441.tmp", "write";
permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache6285608515666175907.tmp", "delete";
permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache6285608515666175907.tmp", "read";
permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache6285608515666175907.tmp", "write";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib\\jgdms-pref-class-loader-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib\\jgdms-url-integrity-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\test.config", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\jsselogins", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\jiniharness.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\jinitests.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\soul\\soul.202105041751026391", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\spec\\lookupservice\\test_set02\\org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
permission java.io.FilePermission "org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
permission java.security.SecurityPermission "createAccessControlContext";
permission java.security.SecurityPermission "createPolicy.JiniPolicy";
permission java.security.SecurityPermission "getDomainCombiner";
permission java.security.SecurityPermission "getPolicy";
permission java.security.SecurityPermission "getProperty.auth.login.defaultCallbackHandler";
permission java.security.SecurityPermission "getProperty.crypto.policy";
permission java.security.SecurityPermission "getProperty.jdk.certpath.disabledAlgorithms";
permission java.security.SecurityPermission "getProperty.jdk.security.caDistrustPolicies";
permission java.security.SecurityPermission "getProperty.jdk.security.provider.preferred";
permission java.security.SecurityPermission "getProperty.jdk.serialFilter";
permission java.security.SecurityPermission "getProperty.jdk.tls.disabledAlgorithms";
permission java.security.SecurityPermission "getProperty.jdk.tls.keyLimits";
permission java.security.SecurityPermission "getProperty.jdk.tls.legacyAlgorithms";
permission java.security.SecurityPermission "getProperty.jdk.tls.server.defaultDHEParameters";
permission java.security.SecurityPermission "getProperty.keystore.type";
permission java.security.SecurityPermission "getProperty.keystore.type.compat";
permission java.security.SecurityPermission "getProperty.login.config.url.1";
permission java.security.SecurityPermission "getProperty.login.configuration.provider";
permission java.security.SecurityPermission "getProperty.policy.allowSystemProperty";
permission java.security.SecurityPermission "getProperty.policy.expandProperties";
permission java.security.SecurityPermission "getProperty.securerandom.drbg.config";
permission java.security.SecurityPermission "getProperty.securerandom.source";
permission java.security.SecurityPermission "getProperty.security.provider.1";
permission java.security.SecurityPermission "getProperty.security.provider.10";
permission java.security.SecurityPermission "getProperty.security.provider.11";
permission java.security.SecurityPermission "getProperty.security.provider.12";
permission java.security.SecurityPermission "getProperty.security.provider.13";
permission java.security.SecurityPermission "getProperty.security.provider.14";
permission java.security.SecurityPermission "getProperty.security.provider.2";
permission java.security.SecurityPermission "getProperty.security.provider.3";
permission java.security.SecurityPermission "getProperty.security.provider.4";
permission java.security.SecurityPermission "getProperty.security.provider.5";
permission java.security.SecurityPermission "getProperty.security.provider.6";
permission java.security.SecurityPermission "getProperty.security.provider.7";
permission java.security.SecurityPermission "getProperty.security.provider.8";
permission java.security.SecurityPermission "getProperty.security.provider.9";
permission java.security.SecurityPermission "getProperty.ssl.TrustManagerFactory.algorithm";
permission java.security.SecurityPermission "putProviderProperty.JdkLDAP";
permission java.security.SecurityPermission "putProviderProperty.JdkSASL";
permission java.security.SecurityPermission "putProviderProperty.SUN";
permission java.security.SecurityPermission "putProviderProperty.SunEC";
permission java.security.SecurityPermission "putProviderProperty.SunJCE";
permission java.security.SecurityPermission "putProviderProperty.SunJGSS";
permission java.security.SecurityPermission "putProviderProperty.SunJSSE";
permission java.security.SecurityPermission "putProviderProperty.SunMSCAPI";
permission java.security.SecurityPermission "putProviderProperty.SunPCSC";
permission java.security.SecurityPermission "putProviderProperty.SunRsaSign";
permission java.security.SecurityPermission "putProviderProperty.SunSASL";
permission java.security.SecurityPermission "putProviderProperty.XMLDSig";
permission java.security.SecurityPermission "setPolicy";
permission java.net.SocketPermission "DESKTOP-R0ORPA2", "connect,accept,resolve";
permission java.net.SocketPermission "DESKTOP-R0ORPA2.lan", "resolve";
permission java.util.PropertyPermission "*", "read,write";
permission java.util.logging.LoggingPermission "control";
};
grant codebase "jrt:/jdk.security.jgss"
{
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
permission java.security.SecurityPermission "putProviderProperty.JdkSASL";
};
grant codebase "httpmd://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar;md5=a28068d398d636dd8fbeace7df8faa77"
{
permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
};
grant codebase "jrt:/jdk.crypto.ec"
{
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.jca";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.pkcs";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util.math";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util.math.intpoly";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.x509";
permission java.lang.RuntimePermission "loadLibrary.sunec";
permission java.security.SecurityPermission "putProviderProperty.SunEC";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-jeri-3.1.1-SNAPSHOT.jar"
{
permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
permission org.apache.river.thread.ThreadPoolPermission "getUserThreadPool";
permission java.io.SerializablePermission "enableSubclassImplementation";
permission java.io.SerializablePermission "enableSubstitution";
permission org.apache.river.jeri.internal.EndpointInternalsPermission "set";
permission java.lang.reflect.ReflectPermission "suppressAccessChecks";
permission javax.security.auth.AuthPermission "getSubject";
permission java.lang.RuntimePermission "getClassLoader";
permission java.lang.RuntimePermission "modifyThread";
permission java.lang.RuntimePermission "modifyThreadGroup";
permission java.lang.RuntimePermission "setContextClassLoader";
permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
permission net.jini.io.context.ContextPermission "net.jini.io.context.ClientSubject.getClientSubject";
permission javax.security.auth.PrivateCredentialPermission "javax.security.auth.x500.X500PrivateCredential javax.security.auth.x500.X500Principal \"CN=Tester\"", "read";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
permission java.net.SocketPermission "DESKTOP-R0ORPA2", "resolve";
permission java.net.SocketPermission "DESKTOP-R0ORPA2.lan", "resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4533", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4555", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4580", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4596", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4604", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4605", "accept,resolve";
permission java.util.PropertyPermission "org.apache.river.jeri.connection.mux.client.initialInboundRation", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.connection.mux.server.initialInboundRation", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.connectionTimeout", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.dgc.checkInterval", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.dgc.cleanInterval", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.dgc.leaseValue", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.dgc.minimumDuration", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.handshakeTimeout", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.server.suppressStackTraces", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.certificateType", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.cipherSuites", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.jceProvider", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.jsseProvider", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.secureRandomAlgorithm", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.sslProtocol", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.tcp.useNIO", "read";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-url-integrity-3.1.1-SNAPSHOT.jar"
{
permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "GET:";
permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar", "GET:";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-jeri-3.1.1-SNAPSHOT.jar",
principal javax.security.auth.x500.X500Principal "CN=Tester"
{
permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
permission javax.security.auth.AuthPermission "getSubject";
permission org.apache.river.api.io.DeSerializationPermission "MARSHALL";
permission java.io.FilePermission "harness\\trust\\truststore", "read";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "accept";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "accept";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
permission java.net.SocketPermission "DESKTOP-R0ORPA2", "resolve";
permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4506", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4533", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4555", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4580", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4596", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4604", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4605", "accept,resolve";
permission java.net.SocketPermission "localhost:0", "listen,resolve";
permission java.util.PropertyPermission "javax.net.ssl.trustStore", "read";
permission java.util.PropertyPermission "javax.net.ssl.trustStorePassword", "read";
permission java.util.PropertyPermission "javax.net.ssl.trustStoreType", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.maxClientSessionDuration", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.maxServerSessionDuration", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.trustManagerFactoryAlgorithm", "read";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/qa/lib/jinitests.jar"
{
permission java.lang.RuntimePermission "createClassLoader";
permission java.util.PropertyPermission "loader.requireDlPerm", "read";
permission java.util.PropertyPermission "net.jini.discovery.announce", "read";
};
grant codebase "jrt:/jdk.security.auth"
{
permission javax.security.auth.AuthPermission "modifyPrincipals";
permission javax.security.auth.AuthPermission "modifyPrivateCredentials";
permission javax.security.auth.AuthPermission "modifyPublicCredentials";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.krb5";
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
permission java.lang.RuntimePermission "getProtectionDomain";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\jiniharness.jar", "read";
};
grant codebase "jrt:/jdk.crypto.cryptoki"
{
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/classserver-3.1.1-SNAPSHOT.jar",
principal javax.security.auth.x500.X500Principal "CN=Tester"
{
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\reggie-dl-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\qa1-lookupservice-dl.jar", "read";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4509", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4510", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4529", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4530", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4532", "accept,resolve";
permission java.net.SocketPermission "localhost:9080", "listen,resolve";
permission java.net.SocketPermission "localhost:9081", "listen,resolve";
permission java.net.SocketPermission "localhost:9082", "listen,resolve";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-collections-3.1.1-SNAPSHOT.jar"
{
permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
permission org.apache.river.thread.ThreadPoolPermission "getUserThreadPool";
permission java.lang.RuntimePermission "getClassLoader";
permission java.lang.RuntimePermission "modifyThread";
permission java.lang.RuntimePermission "modifyThreadGroup";
permission java.lang.RuntimePermission "setContextClassLoader";
permission java.lang.RuntimePermission "shutdownHooks";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
permission java.net.SocketPermission "DESKTOP-R0ORPA2.lan", "resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4533", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4555", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4580", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4596", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4604", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4605", "accept,resolve";
};
grant codebase "jrt:/jdk.localedata"
{
permission java.lang.RuntimePermission "accessClassInPackage.sun.util.locale.provider";
permission java.lang.RuntimePermission "accessClassInPackage.sun.util.resources";
};
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-platform-3.1.1-SNAPSHOT.jar",
principal javax.security.auth.x500.X500Principal "CN=Tester"
{
permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
permission javax.security.auth.AuthPermission "getSubject";
permission java.lang.RuntimePermission "exitVM.0";
permission org.apache.river.api.io.DeSerializationPermission "MARSHALL";
permission java.net.NetPermission "specifyStreamHandler";
permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\java", "execute";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\reggie-dl-3.1.1-SNAPSHOT.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\reggie\\reggie.config", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\starter\\starter.config", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultnonactvm.policy", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultsecurereggie.policy", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\dynamic-policy.properties", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\jsselogins", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\phoenix.keystore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\reggie.keystore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\tester.keystore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\truststore", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\nonactivatablegroup-dl.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\qa1-lookupservice-dl.jar", "read";
permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\resources\\jinitest.policy", "read";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "accept";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "accept";
permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
permission net.jini.security.GrantPermission "net.jini.security.AuthenticationPermission \"javax.security.auth.x500.X500Principal \\\"CN=Tester\\\" peer javax.security.auth.x500.X500Principal \\\"CN=Reggie\\\"\", \"connect\";";
permission java.net.SocketPermission "DESKTOP-R0ORPA2", "resolve";
permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4506", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4509", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4510", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4529", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4530", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4532", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4533", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4555", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4580", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4596", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4604", "accept,resolve";
permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4605", "accept,resolve";
permission java.net.SocketPermission "localhost:0", "listen,resolve";
permission java.net.SocketPermission "localhost:9080", "listen,resolve";
permission java.net.SocketPermission "localhost:9081", "listen,resolve";
permission java.net.SocketPermission "localhost:9082", "listen,resolve";
permission java.util.PropertyPermission "/", "read";
permission java.util.PropertyPermission "HOST", "read";
permission java.util.PropertyPermission "activation.jar", "read";
permission java.util.PropertyPermission "bouncy-jce.jar", "read";
permission java.util.PropertyPermission "bouncy-jsse.jar", "read";
permission java.util.PropertyPermission "classserver.jar", "read";
permission java.util.PropertyPermission "collections.jar", "read";
permission java.util.PropertyPermission "destroy.jar", "read";
permission java.util.PropertyPermission "disco.jar", "read";
permission java.util.PropertyPermission "fiddler-dl.jar", "read";
permission java.util.PropertyPermission "fiddler.jar", "read";
permission java.util.PropertyPermission "file.ext", "read";
permission java.util.PropertyPermission "globalclasspath", "read";
permission java.util.PropertyPermission "group.jar", "read";
permission java.util.PropertyPermission "high-scale-lib.jar", "read";
permission java.util.PropertyPermission "java.class.path", "read";
permission java.util.PropertyPermission "java.home", "read";
permission java.util.PropertyPermission "java.rmi.server.codebase", "read";
permission java.util.PropertyPermission "java.util.logging.config.file", "read";
permission java.util.PropertyPermission "javax.net.ssl.trustStore", "read";
permission java.util.PropertyPermission "javax.net.ssl.trustStorePassword", "read";
permission java.util.PropertyPermission "javax.net.ssl.trustStoreType", "read";
permission java.util.PropertyPermission "jeri.jar", "read";
permission java.util.PropertyPermission "jgdms-rmi-tls.jar", "read";
permission java.util.PropertyPermission "jiniClassServer.adminName", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.dir", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.dir.0", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.impl", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.impl.0", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.port", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.port.0", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs", "read";
permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "jiniClassServer.dir", "read";
permission java.util.PropertyPermission "jiniClassServer.dir.0", "read";
permission java.util.PropertyPermission "jiniClassServer.impl", "read";
permission java.util.PropertyPermission "jiniClassServer.impl.0", "read";
permission java.util.PropertyPermission "jiniClassServer.port", "read";
permission java.util.PropertyPermission "jiniClassServer.port.0", "read";
permission java.util.PropertyPermission "jiniClassServer.serverjvmargs", "read";
permission java.util.PropertyPermission "jiniClassServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "jiniClassServer.transient.impl", "read";
permission java.util.PropertyPermission "jiniClassServer.type", "read";
permission java.util.PropertyPermission "jiniClassServer.type.0", "read";
permission java.util.PropertyPermission "jiniClassServer.type.1", "read";
permission java.util.PropertyPermission "jsk-dl.jar", "read";
permission java.util.PropertyPermission "jsk-lib.jar", "read";
permission java.util.PropertyPermission "jsk.iiop.jar", "read";
permission java.util.PropertyPermission "jsk.jrmp.jar", "read";
permission java.util.PropertyPermission "jsk.pref.jar", "read";
permission java.util.PropertyPermission "jsk.url.jar", "read";
permission java.util.PropertyPermission "loader.jar", "read";
permission java.util.PropertyPermission "mahalo-dl.jar", "read";
permission java.util.PropertyPermission "mahalo.jar", "read";
permission java.util.PropertyPermission "mercury-dl.jar", "read";
permission java.util.PropertyPermission "mercury.jar", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.adminName", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.impl", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.instances", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.1", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.1", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.0", "read";
permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.1", "read";
permission java.util.PropertyPermission "net.jini.discovery.announce", "read";
permission java.util.PropertyPermission "nonActivatableGroup.adminName", "read";
permission java.util.PropertyPermission "nonActivatableGroup.classpath", "read";
permission java.util.PropertyPermission "nonActivatableGroup.classpath.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.codebase", "read";
permission java.util.PropertyPermission "nonActivatableGroup.codebase.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.impl", "read";
permission java.util.PropertyPermission "nonActivatableGroup.impl.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.integrityhash", "read";
permission java.util.PropertyPermission "nonActivatableGroup.integrityhash.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs", "read";
permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.policyfile", "read";
permission java.util.PropertyPermission "nonActivatableGroup.policyfile.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvm", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvm.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs", "read";
permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.transient.impl", "read";
permission java.util.PropertyPermission "nonActivatableGroup.type", "read";
permission java.util.PropertyPermission "nonActivatableGroup.type.0", "read";
permission java.util.PropertyPermission "nonActivatableGroup.type.1", "read";
permission java.util.PropertyPermission "norm-dl.jar", "read";
permission java.util.PropertyPermission "norm.jar", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.maxClientSessionDuration", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.maxServerSessionDuration", "read";
permission java.util.PropertyPermission "org.apache.river.jeri.ssl.trustManagerFactoryAlgorithm", "read";
permission java.util.PropertyPermission "org.apache.river.jsk.home", "read";
permission java.util.PropertyPermission "org.apache.river.jsk.port", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.callAutoT", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9080", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9081", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.globalvmargs", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.integrityhash", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.nSecsWaitDestroy", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.runjiniserver", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.runkitserver", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.securityproperties", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.serviceMode", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.shared", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.startDelay", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.testClassServer", "read";
permission java.util.PropertyPermission "org.apache.river.qa.harness.testhosts", "read";
permission java.util.PropertyPermission "org.apache.river.qa.home", "read";
permission java.util.PropertyPermission "org.apache.river.qa.port", "read";
permission java.util.PropertyPermission "org.apache.river.reggie.enableImplToStubReplacement", "read";
permission java.util.PropertyPermission "org.apache.river.test.home", "read";
permission java.util.PropertyPermission "org.apache.river.test.port", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actClasspath", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actCodebase", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntLeaseExp", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntNotify", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTListener", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTSrvcLeaseExp", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.nInstancesPerClass", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.outputRoot", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.policy", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.rmiCodebase", "read";
permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.selectMethod", "read";
permission java.util.PropertyPermission "os.name", "read";
permission java.util.PropertyPermission "outrigger-dl.jar", "read";
permission java.util.PropertyPermission "outrigger-snaplogstore.jar", "read";
permission java.util.PropertyPermission "outrigger.jar", "read";
permission java.util.PropertyPermission "phoenix-common.jar", "read";
permission java.util.PropertyPermission "phoenix-dl.jar", "read";
permission java.util.PropertyPermission "phoenix-group.jar", "read";
permission java.util.PropertyPermission "phoenix-init.jar", "read";
permission java.util.PropertyPermission "phoenix.jar", "read";
permission java.util.PropertyPermission "platform.jar", "read";
permission java.util.PropertyPermission "policy.writer.jar", "read";
permission java.util.PropertyPermission "qaClassServer.adminName", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.dir", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.dir.0", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.impl", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.impl.0", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.port", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.port.0", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs", "read";
permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "qaClassServer.dir", "read";
permission java.util.PropertyPermission "qaClassServer.dir.0", "read";
permission java.util.PropertyPermission "qaClassServer.impl", "read";
permission java.util.PropertyPermission "qaClassServer.impl.0", "read";
permission java.util.PropertyPermission "qaClassServer.port", "read";
permission java.util.PropertyPermission "qaClassServer.port.0", "read";
permission java.util.PropertyPermission "qaClassServer.serverjvmargs", "read";
permission java.util.PropertyPermission "qaClassServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "qaClassServer.transient.impl", "read";
permission java.util.PropertyPermission "qaClassServer.type", "read";
permission java.util.PropertyPermission "qaClassServer.type.0", "read";
permission java.util.PropertyPermission "qaClassServer.type.1", "read";
permission java.util.PropertyPermission "reggie-dl.jar", "read";
permission java.util.PropertyPermission "reggie.jar", "read";
permission java.util.PropertyPermission "river.version", "read";
permission java.util.PropertyPermission "start.jar", "read";
permission java.util.PropertyPermission "testClassServer.adminName", "read";
permission java.util.PropertyPermission "testClassServer.classServer.dir", "read";
permission java.util.PropertyPermission "testClassServer.classServer.dir.0", "read";
permission java.util.PropertyPermission "testClassServer.classServer.impl", "read";
permission java.util.PropertyPermission "testClassServer.classServer.impl.0", "read";
permission java.util.PropertyPermission "testClassServer.classServer.port", "read";
permission java.util.PropertyPermission "testClassServer.classServer.port.0", "read";
permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs", "read";
permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "testClassServer.dir", "read";
permission java.util.PropertyPermission "testClassServer.dir.0", "read";
permission java.util.PropertyPermission "testClassServer.impl", "read";
permission java.util.PropertyPermission "testClassServer.impl.0", "read";
permission java.util.PropertyPermission "testClassServer.port", "read";
permission java.util.PropertyPermission "testClassServer.port.0", "read";
permission java.util.PropertyPermission "testClassServer.serverjvmargs", "read";
permission java.util.PropertyPermission "testClassServer.serverjvmargs.0", "read";
permission java.util.PropertyPermission "testClassServer.transient.impl", "read";
permission java.util.PropertyPermission "testClassServer.type", "read";
permission java.util.PropertyPermission "testClassServer.type.0", "read";
permission java.util.PropertyPermission "testClassServer.type.1", "read";
permission java.util.PropertyPermission "user.dir", "read";
};
grant codebase "jrt:/java.xml.crypto"
{
permission java.security.SecurityPermission "putProviderProperty.XMLDSig";
permission java.util.PropertyPermission "java.specification.version", "read";
};
More information about the security-dev
mailing list