[ 
https://issues.apache.org/jira/browse/OPENJPA-244?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Marc Prud'hommeaux reopened OPENJPA-244:
----------------------------------------


I'm re-opening the issue because it looks like there are at least a few secure 
calls that were missed. I ran a test by building a new rt.jar with a 
java.lang.SecurityException that extends java.lang.Exception (instead of 
java.lang.RuntimeException), and then compiling the openjpa classes with the 
new rt.jar in the bootclasspath, which does a nice job at finding all the calls 
to methods that might throw SecutiryException.

For example, FieldMetaData.java:1477 contains the line "Method[] methods = 
cls.getMethods()".

Are these oversights, or is there some reason that these calls don't need to be 
wrapped in doPriv blocks?

> Java 2 Security enablement
> --------------------------
>
>                 Key: OPENJPA-244
>                 URL: https://issues.apache.org/jira/browse/OPENJPA-244
>             Project: OpenJPA
>          Issue Type: Bug
>    Affects Versions: 0.9.8
>            Reporter: Kevin Sutter
>         Attachments: OPENJPA-244.patch
>
>
> Via some testing with the WebSphere Application Server, it's been discovered 
> that we're missing some doPriv blocks through out the OpenJPA code base.  
> This JIRA report will be used to resolve these issues.  More specific 
> examples will be posted later.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to