The current policy parser implementation still generates CodeSource based grant's, these can cause dns lookups when CodeSource.implies is called. For this reason, as soon as all tests are confirmed passing, I'll be switching it over to utilise URI based grants.

Peter.

Peter Firmstone wrote:
net.jini.security.policy.ConcurrentPolicyFile is a concurrent replacement for sun.security.provider.PolicyFile and combined with DynamicPolicyProvider is passing all policy provider and security tests for Apache River, except for one appended below.

The good news is this test checks for the SecurityPermission accessClassInPackage sun.security.provider.

Since we aren't accessing a class in sun.security.provider, the test failure is based on an assumption of using Sun's PolicyFile implementation.

The new ConcurrentPolicyFile is based on code from Apache Harmony, refactored for concurrency and full support of Sun's java policy file syntax, including the undocumented array properties delimited by double curly braces ${{java.ext.dirs}} , values delimited by colon : . It's also capable of expanding nested properties.

The policy parser will also be used for the RemotePolicy implementation to enable administrator nodes to update security policy within a djinn.

Cheers,

Peter.

Reply via email to