rubyfox-server 2.17.3.1 → 2.19.2.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (160) hide show
  1. checksums.yaml +4 -4
  2. data/lib/rubyfox/server/data/config/admin/descriptors/config_room.txt +10 -1
  3. data/lib/rubyfox/server/data/config/admin/descriptors/config_server.txt +90 -20
  4. data/lib/rubyfox/server/data/config/admin/descriptors/config_zone.txt +9 -0
  5. data/lib/rubyfox/server/data/config/admin/descriptors/runtime_room.txt +11 -0
  6. data/lib/rubyfox/server/data/config/admin/descriptors/runtime_user.txt +3 -3
  7. data/lib/rubyfox/server/data/config/core.xml +4 -4
  8. data/lib/rubyfox/server/data/config/default.words.txt +11 -0
  9. data/lib/rubyfox/server/data/config/log4j.properties +1 -2
  10. data/lib/rubyfox/server/data/config/server.xml +1 -1
  11. data/lib/rubyfox/server/data/data/GeoLite2-Country.mmdb +0 -0
  12. data/lib/rubyfox/server/data/data/bannedusers/users.bin +0 -0
  13. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/bootstrap.jar +0 -0
  14. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/catalina-tasks.xml +39 -39
  15. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/catalina.sh +0 -0
  16. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/ciphers.sh +0 -0
  17. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/commons-daemon-native.tar.gz +0 -0
  18. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/commons-daemon.jar +0 -0
  19. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/configtest.sh +0 -0
  20. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/daemon.sh +0 -0
  21. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/digest.sh +0 -0
  22. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/makebase.sh +0 -0
  23. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/setclasspath.sh +0 -0
  24. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/shutdown.sh +0 -0
  25. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/startup.sh +0 -0
  26. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/tomcat-juli.jar +0 -0
  27. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/tomcat-native.tar.gz +0 -0
  28. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/tool-wrapper.sh +0 -0
  29. data/lib/rubyfox/server/data/lib/apache-tomcat/bin/version.sh +0 -0
  30. data/lib/rubyfox/server/data/lib/apache-tomcat/conf/Catalina/localhost/rewrite.config +1 -1
  31. data/lib/rubyfox/server/data/lib/apache-tomcat/conf/catalina.policy +263 -264
  32. data/lib/rubyfox/server/data/lib/apache-tomcat/conf/catalina.properties +209 -207
  33. data/lib/rubyfox/server/data/lib/apache-tomcat/conf/context.xml +31 -31
  34. data/lib/rubyfox/server/data/lib/apache-tomcat/conf/jaspic-providers.xml +23 -23
  35. data/lib/rubyfox/server/data/lib/apache-tomcat/conf/jaspic-providers.xsd +52 -52
  36. data/lib/rubyfox/server/data/lib/apache-tomcat/conf/keystore.jks +0 -0
  37. data/lib/rubyfox/server/data/lib/apache-tomcat/conf/server.xml +177 -161
  38. data/lib/rubyfox/server/data/lib/apache-tomcat/conf/tomcat-users.xml +18 -7
  39. data/lib/rubyfox/server/data/lib/apache-tomcat/conf/tomcat-users.xsd +59 -59
  40. data/lib/rubyfox/server/data/lib/apache-tomcat/conf/web.xml +4740 -4737
  41. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/annotations-api.jar +0 -0
  42. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/catalina-ant.jar +0 -0
  43. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/catalina-ha.jar +0 -0
  44. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/catalina-ssi.jar +0 -0
  45. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/catalina-storeconfig.jar +0 -0
  46. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/catalina-tribes.jar +0 -0
  47. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/catalina.jar +0 -0
  48. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/el-api.jar +0 -0
  49. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/jasper-el.jar +0 -0
  50. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/jasper.jar +0 -0
  51. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/jaspic-api.jar +0 -0
  52. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/jsp-api.jar +0 -0
  53. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/servlet-api.jar +0 -0
  54. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/sfs2x-ws-helper.jar +0 -0
  55. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-api.jar +0 -0
  56. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-coyote.jar +0 -0
  57. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-dbcp.jar +0 -0
  58. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-i18n-cs.jar +0 -0
  59. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-i18n-de.jar +0 -0
  60. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-i18n-es.jar +0 -0
  61. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-i18n-fr.jar +0 -0
  62. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-i18n-ja.jar +0 -0
  63. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-i18n-ko.jar +0 -0
  64. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-i18n-pt-BR.jar +0 -0
  65. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-i18n-ru.jar +0 -0
  66. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-i18n-zh-CN.jar +0 -0
  67. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-jdbc.jar +0 -0
  68. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-jni.jar +0 -0
  69. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-util-scan.jar +0 -0
  70. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-util.jar +0 -0
  71. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/tomcat-websocket.jar +0 -0
  72. data/lib/rubyfox/server/data/lib/apache-tomcat/lib/websocket-api.jar +0 -0
  73. data/lib/rubyfox/server/data/lib/javax.activation-1.2.0.jar +0 -0
  74. data/lib/rubyfox/server/data/lib/javax.mail.jar +0 -0
  75. data/lib/rubyfox/server/data/lib/js/JSApi.js +2 -1
  76. data/lib/rubyfox/server/data/lib/js/LibApi.js +181 -48
  77. data/lib/rubyfox/server/data/lib/sfs2x-admin.jar +0 -0
  78. data/lib/rubyfox/server/data/lib/sfs2x-cluster.jar +0 -0
  79. data/lib/rubyfox/server/data/lib/sfs2x-core.jar +0 -0
  80. data/lib/rubyfox/server/data/lib/sfs2x.jar +0 -0
  81. data/lib/rubyfox/server/data/sfs2x-service +26 -30
  82. data/lib/rubyfox/server/data/www/BlueBox.war +0 -0
  83. data/lib/rubyfox/server/data/www/HelloServlet/WEB-INF/web.xml +1 -3
  84. data/lib/rubyfox/server/data/www/ROOT/_css_/default.css +14 -6
  85. data/lib/rubyfox/server/data/www/ROOT/admin/assets/css/style.css +44 -2
  86. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/application.bundle.js +98 -61
  87. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/endors~mod-0~mod-1~mod-11~mod-12~mod-17~mod-6~mod-7~mod-8~mod-9.bundle.js +17357 -0
  88. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-0.bundle.js +4 -4
  89. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-1.bundle.js +3 -3
  90. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-10.bundle.js +101 -66
  91. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-11.bundle.js +544 -8
  92. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-12.bundle.js +915 -1480
  93. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-12~module-15~module-16~module-4.bundle.js +2665 -0
  94. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-13.bundle.js +606 -3093
  95. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-13~module-16~module-17~module-4.bundle.js +2665 -0
  96. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-14.bundle.js +764 -0
  97. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-15.bundle.js +71 -0
  98. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-16.bundle.js +1787 -0
  99. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-17.bundle.js +3383 -0
  100. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-4.bundle.js +121 -1009
  101. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-5.bundle.js +1214 -1744
  102. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-6.bundle.js +398 -666
  103. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-7.bundle.js +717 -192
  104. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-8.bundle.js +2117 -665
  105. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-9.bundle.js +613 -690
  106. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/vendors~mod-0~mod-1~mod-10~mod-11~mod-16~mod-5~mod-6~mod-7~mod-8.bundle.js +17357 -0
  107. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/vendors~mod-0~mod-1~mod-11~mod-12~mod-17~mod-5~mod-6~mod-7~mod-8~mod-9.bundle.js +17357 -0
  108. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/{vendors~module-0~module-1~module-13~module-4~module-5~module-7~module-8.bundle.js → vendors~mod-0~mod-1~mod-11~mod-12~mod-17~mod-5~mod-7~mod-8~mod-9.bundle.js} +2 -2
  109. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/vendors~module-12.bundle.js +807 -0
  110. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/vendors~module-13.bundle.js +807 -0
  111. data/lib/rubyfox/server/data/www/ROOT/admin/modules/cluster-configurator.html +32 -0
  112. data/lib/rubyfox/server/data/www/ROOT/admin/modules/cluster-monitor.html +185 -0
  113. data/lib/rubyfox/server/data/www/ROOT/admin/modules/cluster-updater.html +47 -0
  114. data/lib/rubyfox/server/data/www/ROOT/admin/modules/extension-deployer.html +84 -0
  115. data/lib/rubyfox/server/data/www/ROOT/admin/modules/zone-monitor.html +15 -8
  116. data/lib/rubyfox/server/data/www/ROOT/index.html +13 -23
  117. data/lib/rubyfox/server/data/www/host-manager/META-INF/context.xml +2 -2
  118. data/lib/rubyfox/server/data/www/host-manager/WEB-INF/jsp/404.jsp +2 -2
  119. data/lib/rubyfox/server/data/www/host-manager/{manager.xml → WEB-INF/manager.xml} +5 -1
  120. data/lib/rubyfox/server/data/www/host-manager/WEB-INF/web.xml +17 -0
  121. data/lib/rubyfox/server/data/www/host-manager/css/manager.css +141 -0
  122. data/lib/rubyfox/server/data/www/host-manager/images/tomcat.svg +967 -0
  123. data/lib/rubyfox/server/data/www/manager/META-INF/context.xml +2 -0
  124. data/lib/rubyfox/server/data/www/manager/WEB-INF/jsp/connectorCerts.jsp +1 -1
  125. data/lib/rubyfox/server/data/www/manager/WEB-INF/jsp/connectorCiphers.jsp +1 -1
  126. data/lib/rubyfox/server/data/www/manager/WEB-INF/jsp/connectorTrustedCerts.jsp +1 -1
  127. data/lib/rubyfox/server/data/www/manager/WEB-INF/jsp/sessionDetail.jsp +3 -3
  128. data/lib/rubyfox/server/data/www/manager/WEB-INF/jsp/sessionsList.jsp +1 -1
  129. data/lib/rubyfox/server/data/www/manager/WEB-INF/web.xml +17 -0
  130. data/lib/rubyfox/server/data/www/manager/css/manager.css +141 -0
  131. data/lib/rubyfox/server/data/www/manager/images/tomcat.svg +967 -0
  132. data/lib/rubyfox/server/data/www/manager/xform.xsl +74 -59
  133. data/lib/rubyfox/server/version.rb +1 -1
  134. metadata +30 -31
  135. data/lib/rubyfox/server/data/config/admin/icons/Analytics.png +0 -0
  136. data/lib/rubyfox/server/data/config/admin/icons/BanManager.png +0 -0
  137. data/lib/rubyfox/server/data/config/admin/icons/BlueBoxMonitor.png +0 -0
  138. data/lib/rubyfox/server/data/config/admin/icons/Console.png +0 -0
  139. data/lib/rubyfox/server/data/config/admin/icons/Dashboard.png +0 -0
  140. data/lib/rubyfox/server/data/config/admin/icons/ExtensionManager.png +0 -0
  141. data/lib/rubyfox/server/data/config/admin/icons/LicenseManager.png +0 -0
  142. data/lib/rubyfox/server/data/config/admin/icons/LogViewer.png +0 -0
  143. data/lib/rubyfox/server/data/config/admin/icons/ServerConfigurator.png +0 -0
  144. data/lib/rubyfox/server/data/config/admin/icons/ServletManager.png +0 -0
  145. data/lib/rubyfox/server/data/config/admin/icons/ZoneConfigurator.png +0 -0
  146. data/lib/rubyfox/server/data/config/admin/icons/ZoneMonitor.png +0 -0
  147. data/lib/rubyfox/server/data/lib/BlueBox.war +0 -0
  148. data/lib/rubyfox/server/data/lib/apache-tomcat/LICENSE +0 -1061
  149. data/lib/rubyfox/server/data/lib/apache-tomcat/NOTICE +0 -68
  150. data/lib/rubyfox/server/data/lib/apache-tomcat/README.md +0 -81
  151. data/lib/rubyfox/server/data/lib/apache-tomcat/RELEASE-NOTES +0 -174
  152. data/lib/rubyfox/server/data/lib/imap.jar +0 -0
  153. data/lib/rubyfox/server/data/lib/mailapi.jar +0 -0
  154. data/lib/rubyfox/server/data/lib/pop3.jar +0 -0
  155. data/lib/rubyfox/server/data/lib/smtp.jar +0 -0
  156. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/module-12~module-13~module-9.bundle.js +0 -2634
  157. data/lib/rubyfox/server/data/www/ROOT/admin/assets/js/core/modules/vendors~module-9.bundle.js +0 -807
  158. data/lib/rubyfox/server/data/www/host-manager/images/tomcat.gif +0 -0
  159. data/lib/rubyfox/server/data/www/manager/images/tomcat.gif +0 -0
  160. /data/lib/rubyfox/server/data/data/buddylists/{BasicExamples/.keep → .keep} +0 -0
@@ -1,265 +1,264 @@
1
- // Licensed to the Apache Software Foundation (ASF) under one or more
2
- // contributor license agreements. See the NOTICE file distributed with
3
- // this work for additional information regarding copyright ownership.
4
- // The ASF licenses this file to You under the Apache License, Version 2.0
5
- // (the "License"); you may not use this file except in compliance with
6
- // the License. You may obtain a copy of the License at
7
- //
8
- // http://www.apache.org/licenses/LICENSE-2.0
9
- //
10
- // Unless required by applicable law or agreed to in writing, software
11
- // distributed under the License is distributed on an "AS IS" BASIS,
12
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
- // See the License for the specific language governing permissions and
14
- // limitations under the License.
15
-
16
- // ============================================================================
17
- // catalina.policy - Security Policy Permissions for Tomcat
18
- //
19
- // This file contains a default set of security policies to be enforced (by the
20
- // JVM) when Catalina is executed with the "-security" option. In addition
21
- // to the permissions granted here, the following additional permissions are
22
- // granted to each web application:
23
- //
24
- // * Read access to the web application's document root directory
25
- // * Read, write and delete access to the web application's working directory
26
- // ============================================================================
27
-
28
-
29
- // ========== SYSTEM CODE PERMISSIONS =========================================
30
-
31
-
32
- // These permissions apply to javac
33
- grant codeBase "file:${java.home}/lib/-" {
34
- permission java.security.AllPermission;
35
- };
36
-
37
- // These permissions apply to all shared system extensions
38
- grant codeBase "file:${java.home}/jre/lib/ext/-" {
39
- permission java.security.AllPermission;
40
- };
41
-
42
- // These permissions apply to javac when ${java.home} points at $JAVA_HOME/jre
43
- grant codeBase "file:${java.home}/../lib/-" {
44
- permission java.security.AllPermission;
45
- };
46
-
47
- // These permissions apply to all shared system extensions when
48
- // ${java.home} points at $JAVA_HOME/jre
49
- grant codeBase "file:${java.home}/lib/ext/-" {
50
- permission java.security.AllPermission;
51
- };
52
-
53
- // This permission is required when using javac to compile JSPs on Java 9
54
- // onwards
55
- //grant codeBase "jrt:/jdk.compiler" {
56
- // permission java.security.AllPermission;
57
- //};
58
-
59
-
60
- // ========== CATALINA CODE PERMISSIONS =======================================
61
-
62
- // These permissions apply to the daemon code
63
- grant codeBase "file:${catalina.home}/bin/commons-daemon.jar" {
64
- permission java.security.AllPermission;
65
- };
66
-
67
- // These permissions apply to the logging API
68
- // Note: If tomcat-juli.jar is in ${catalina.base} and not in ${catalina.home},
69
- // update this section accordingly.
70
- // grant codeBase "file:${catalina.base}/bin/tomcat-juli.jar" {..}
71
- grant codeBase "file:${catalina.home}/bin/tomcat-juli.jar" {
72
- permission java.io.FilePermission
73
- "${java.home}${file.separator}lib${file.separator}logging.properties", "read";
74
-
75
- permission java.io.FilePermission
76
- "${catalina.base}${file.separator}conf${file.separator}logging.properties", "read";
77
- permission java.io.FilePermission
78
- "${catalina.base}${file.separator}logs", "read, write";
79
- permission java.io.FilePermission
80
- "${catalina.base}${file.separator}logs${file.separator}*", "read, write, delete";
81
-
82
- permission java.lang.RuntimePermission "shutdownHooks";
83
- permission java.lang.RuntimePermission "getClassLoader";
84
- permission java.lang.RuntimePermission "setContextClassLoader";
85
-
86
- permission java.lang.management.ManagementPermission "monitor";
87
-
88
- permission java.util.logging.LoggingPermission "control";
89
-
90
- permission java.util.PropertyPermission "java.util.logging.config.class", "read";
91
- permission java.util.PropertyPermission "java.util.logging.config.file", "read";
92
- permission java.util.PropertyPermission "org.apache.juli.AsyncLoggerPollInterval", "read";
93
- permission java.util.PropertyPermission "org.apache.juli.AsyncMaxRecordCount", "read";
94
- permission java.util.PropertyPermission "org.apache.juli.AsyncOverflowDropType", "read";
95
- permission java.util.PropertyPermission "org.apache.juli.ClassLoaderLogManager.debug", "read";
96
- permission java.util.PropertyPermission "catalina.base", "read";
97
-
98
- // Note: To enable per context logging configuration, permit read access to
99
- // the appropriate file. Be sure that the logging configuration is
100
- // secure before enabling such access.
101
- // E.g. for the examples web application (uncomment and unwrap
102
- // the following to be on a single line):
103
- // permission java.io.FilePermission "${catalina.base}${file.separator}
104
- // webapps${file.separator}examples${file.separator}WEB-INF
105
- // ${file.separator}classes${file.separator}logging.properties", "read";
106
- };
107
-
108
- // These permissions apply to the server startup code
109
- grant codeBase "file:${catalina.home}/bin/bootstrap.jar" {
110
- permission java.security.AllPermission;
111
- };
112
-
113
- // These permissions apply to the servlet API classes
114
- // and those that are shared across all class loaders
115
- // located in the "lib" directory
116
- grant codeBase "file:${catalina.home}/lib/-" {
117
- permission java.security.AllPermission;
118
- };
119
-
120
-
121
- // If using a per instance lib directory, i.e. ${catalina.base}/lib,
122
- // then the following permission will need to be uncommented
123
- // grant codeBase "file:${catalina.base}/lib/-" {
124
- // permission java.security.AllPermission;
125
- // };
126
-
127
-
128
- // ========== WEB APPLICATION PERMISSIONS =====================================
129
-
130
-
131
- // These permissions are granted by default to all web applications
132
- // In addition, a web application will be given a read FilePermission
133
- // for all files and directories in its document root.
134
- grant {
135
- // Required for JNDI lookup of named JDBC DataSource's and
136
- // javamail named MimePart DataSource used to send mail
137
- permission java.util.PropertyPermission "java.home", "read";
138
- permission java.util.PropertyPermission "java.naming.*", "read";
139
- permission java.util.PropertyPermission "javax.sql.*", "read";
140
-
141
- // OS Specific properties to allow read access
142
- permission java.util.PropertyPermission "os.name", "read";
143
- permission java.util.PropertyPermission "os.version", "read";
144
- permission java.util.PropertyPermission "os.arch", "read";
145
- permission java.util.PropertyPermission "file.separator", "read";
146
- permission java.util.PropertyPermission "path.separator", "read";
147
- permission java.util.PropertyPermission "line.separator", "read";
148
-
149
- // JVM properties to allow read access
150
- permission java.util.PropertyPermission "java.version", "read";
151
- permission java.util.PropertyPermission "java.vendor", "read";
152
- permission java.util.PropertyPermission "java.vendor.url", "read";
153
- permission java.util.PropertyPermission "java.class.version", "read";
154
- permission java.util.PropertyPermission "java.specification.version", "read";
155
- permission java.util.PropertyPermission "java.specification.vendor", "read";
156
- permission java.util.PropertyPermission "java.specification.name", "read";
157
-
158
- permission java.util.PropertyPermission "java.vm.specification.version", "read";
159
- permission java.util.PropertyPermission "java.vm.specification.vendor", "read";
160
- permission java.util.PropertyPermission "java.vm.specification.name", "read";
161
- permission java.util.PropertyPermission "java.vm.version", "read";
162
- permission java.util.PropertyPermission "java.vm.vendor", "read";
163
- permission java.util.PropertyPermission "java.vm.name", "read";
164
-
165
- // Required for OpenJMX
166
- permission java.lang.RuntimePermission "getAttribute";
167
-
168
- // Allow read of JAXP compliant XML parser debug
169
- permission java.util.PropertyPermission "jaxp.debug", "read";
170
-
171
- // All JSPs need to be able to read this package
172
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.tomcat";
173
-
174
- // Precompiled JSPs need access to these packages.
175
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.jasper.el";
176
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.jasper.runtime";
177
- permission java.lang.RuntimePermission
178
- "accessClassInPackage.org.apache.jasper.runtime.*";
179
-
180
- // Applications using WebSocket need to be able to access these packages
181
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.tomcat.websocket";
182
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.tomcat.websocket.server";
183
- };
184
-
185
-
186
- // The Manager application needs access to the following packages to support the
187
- // session display functionality. It also requires the custom Tomcat
188
- // DeployXmlPermission to enable the use of META-INF/context.xml
189
- // These settings support the following configurations:
190
- // - default CATALINA_HOME == CATALINA_BASE
191
- // - CATALINA_HOME != CATALINA_BASE, per instance Manager in CATALINA_BASE
192
- // - CATALINA_HOME != CATALINA_BASE, shared Manager in CATALINA_HOME
193
- grant codeBase "file:${catalina.base}/webapps/manager/-" {
194
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina";
195
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.ha.session";
196
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.manager";
197
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.manager.util";
198
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.util";
199
- permission org.apache.catalina.security.DeployXmlPermission "manager";
200
- };
201
- grant codeBase "file:${catalina.home}/webapps/manager/-" {
202
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina";
203
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.ha.session";
204
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.manager";
205
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.manager.util";
206
- permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.util";
207
- permission org.apache.catalina.security.DeployXmlPermission "manager";
208
- };
209
-
210
- // The Host Manager application needs the custom Tomcat DeployXmlPermission to
211
- // enable the use of META-INF/context.xml
212
- // These settings support the following configurations:
213
- // - default CATALINA_HOME == CATALINA_BASE
214
- // - CATALINA_HOME != CATALINA_BASE, per instance Host Manager in CATALINA_BASE
215
- // - CATALINA_HOME != CATALINA_BASE, shared Host Manager in CATALINA_HOME
216
- grant codeBase "file:${catalina.base}/webapps/host-manager/-" {
217
- permission org.apache.catalina.security.DeployXmlPermission "host-manager";
218
- };
219
- grant codeBase "file:${catalina.home}/webapps/host-manager/-" {
220
- permission org.apache.catalina.security.DeployXmlPermission "host-manager";
221
- };
222
-
223
-
224
- // You can assign additional permissions to particular web applications by
225
- // adding additional "grant" entries here, based on the code base for that
226
- // application, /WEB-INF/classes/, or /WEB-INF/lib/ jar files.
227
- //
228
- // Different permissions can be granted to JSP pages, classes loaded from
229
- // the /WEB-INF/classes/ directory, all jar files in the /WEB-INF/lib/
230
- // directory, or even to individual jar files in the /WEB-INF/lib/ directory.
231
- //
232
- // For instance, assume that the standard "examples" application
233
- // included a JDBC driver that needed to establish a network connection to the
234
- // corresponding database and used the scrape taglib to get the weather from
235
- // the NOAA web server. You might create a "grant" entries like this:
236
- //
237
- // The permissions granted to the context root directory apply to JSP pages.
238
- // grant codeBase "file:${catalina.base}/webapps/examples/-" {
239
- // permission java.net.SocketPermission "dbhost.mycompany.com:5432", "connect";
240
- // permission java.net.SocketPermission "*.noaa.gov:80", "connect";
241
- // };
242
- //
243
- // The permissions granted to the context WEB-INF/classes directory
244
- // grant codeBase "file:${catalina.base}/webapps/examples/WEB-INF/classes/-" {
245
- // };
246
- //
247
- // The permission granted to your JDBC driver
248
- // grant codeBase "jar:file:${catalina.base}/webapps/examples/WEB-INF/lib/driver.jar!/-" {
249
- // permission java.net.SocketPermission "dbhost.mycompany.com:5432", "connect";
250
- // };
251
- // The permission granted to the scrape taglib
252
- // grant codeBase "jar:file:${catalina.base}/webapps/examples/WEB-INF/lib/scrape.jar!/-" {
253
- // permission java.net.SocketPermission "*.noaa.gov:80", "connect";
254
- // };
255
-
256
- // To grant permissions for web applications using packed WAR files, use the
257
- // Tomcat specific WAR url scheme.
258
- //
259
- // The permissions granted to the entire web application
260
- // grant codeBase "war:file:${catalina.base}/webapps/examples.war*/-" {
261
- // };
262
- //
263
- // The permissions granted to a specific JAR
264
- // grant codeBase "war:file:${catalina.base}/webapps/examples.war*/WEB-INF/lib/foo.jar" {
1
+ // Licensed to the Apache Software Foundation (ASF) under one or more
2
+ // contributor license agreements. See the NOTICE file distributed with
3
+ // this work for additional information regarding copyright ownership.
4
+ // The ASF licenses this file to You under the Apache License, Version 2.0
5
+ // (the "License"); you may not use this file except in compliance with
6
+ // the License. You may obtain a copy of the License at
7
+ //
8
+ // http://www.apache.org/licenses/LICENSE-2.0
9
+ //
10
+ // Unless required by applicable law or agreed to in writing, software
11
+ // distributed under the License is distributed on an "AS IS" BASIS,
12
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ // See the License for the specific language governing permissions and
14
+ // limitations under the License.
15
+
16
+ // ============================================================================
17
+ // catalina.policy - Security Policy Permissions for Tomcat
18
+ //
19
+ // This file contains a default set of security policies to be enforced (by the
20
+ // JVM) when Catalina is executed with the "-security" option. In addition
21
+ // to the permissions granted here, the following additional permissions are
22
+ // granted to each web application:
23
+ //
24
+ // * Read access to the web application's document root directory
25
+ // * Read, write and delete access to the web application's working directory
26
+ // ============================================================================
27
+
28
+
29
+ // ========== SYSTEM CODE PERMISSIONS =========================================
30
+
31
+
32
+ // These permissions apply to javac
33
+ grant codeBase "file:${java.home}/lib/-" {
34
+ permission java.security.AllPermission;
35
+ };
36
+
37
+ // These permissions apply to all shared system extensions
38
+ grant codeBase "file:${java.home}/jre/lib/ext/-" {
39
+ permission java.security.AllPermission;
40
+ };
41
+
42
+ // These permissions apply to javac when ${java.home} points at $JAVA_HOME/jre
43
+ grant codeBase "file:${java.home}/../lib/-" {
44
+ permission java.security.AllPermission;
45
+ };
46
+
47
+ // These permissions apply to all shared system extensions when
48
+ // ${java.home} points at $JAVA_HOME/jre
49
+ grant codeBase "file:${java.home}/lib/ext/-" {
50
+ permission java.security.AllPermission;
51
+ };
52
+
53
+ // This permission is required when using javac to compile JSPs on Java 9
54
+ // onwards
55
+ //grant codeBase "jrt:/jdk.compiler" {
56
+ // permission java.security.AllPermission;
57
+ //};
58
+
59
+
60
+ // ========== CATALINA CODE PERMISSIONS =======================================
61
+
62
+ // These permissions apply to the daemon code
63
+ grant codeBase "file:${catalina.home}/bin/commons-daemon.jar" {
64
+ permission java.security.AllPermission;
65
+ };
66
+
67
+ // These permissions apply to the logging API
68
+ // Note: If tomcat-juli.jar is in ${catalina.base} and not in ${catalina.home},
69
+ // update this section accordingly.
70
+ // grant codeBase "file:${catalina.base}/bin/tomcat-juli.jar" {..}
71
+ grant codeBase "file:${catalina.home}/bin/tomcat-juli.jar" {
72
+ permission java.io.FilePermission
73
+ "${java.home}${file.separator}lib${file.separator}logging.properties", "read";
74
+
75
+ permission java.io.FilePermission
76
+ "${catalina.base}${file.separator}conf${file.separator}logging.properties", "read";
77
+ permission java.io.FilePermission
78
+ "${catalina.base}${file.separator}logs", "read, write";
79
+ permission java.io.FilePermission
80
+ "${catalina.base}${file.separator}logs${file.separator}*", "read, write, delete";
81
+
82
+ permission java.lang.RuntimePermission "shutdownHooks";
83
+ permission java.lang.RuntimePermission "getClassLoader";
84
+ permission java.lang.RuntimePermission "setContextClassLoader";
85
+
86
+ permission java.lang.management.ManagementPermission "monitor";
87
+
88
+ permission java.util.logging.LoggingPermission "control";
89
+
90
+ permission java.util.PropertyPermission "java.util.logging.config.class", "read";
91
+ permission java.util.PropertyPermission "java.util.logging.config.file", "read";
92
+ permission java.util.PropertyPermission "org.apache.juli.AsyncMaxRecordCount", "read";
93
+ permission java.util.PropertyPermission "org.apache.juli.AsyncOverflowDropType", "read";
94
+ permission java.util.PropertyPermission "org.apache.juli.ClassLoaderLogManager.debug", "read";
95
+ permission java.util.PropertyPermission "catalina.base", "read";
96
+
97
+ // Note: To enable per context logging configuration, permit read access to
98
+ // the appropriate file. Be sure that the logging configuration is
99
+ // secure before enabling such access.
100
+ // E.g. for the examples web application (uncomment and unwrap
101
+ // the following to be on a single line):
102
+ // permission java.io.FilePermission "${catalina.base}${file.separator}
103
+ // webapps${file.separator}examples${file.separator}WEB-INF
104
+ // ${file.separator}classes${file.separator}logging.properties", "read";
105
+ };
106
+
107
+ // These permissions apply to the server startup code
108
+ grant codeBase "file:${catalina.home}/bin/bootstrap.jar" {
109
+ permission java.security.AllPermission;
110
+ };
111
+
112
+ // These permissions apply to the servlet API classes
113
+ // and those that are shared across all class loaders
114
+ // located in the "lib" directory
115
+ grant codeBase "file:${catalina.home}/lib/-" {
116
+ permission java.security.AllPermission;
117
+ };
118
+
119
+
120
+ // If using a per instance lib directory, i.e. ${catalina.base}/lib,
121
+ // then the following permission will need to be uncommented
122
+ // grant codeBase "file:${catalina.base}/lib/-" {
123
+ // permission java.security.AllPermission;
124
+ // };
125
+
126
+
127
+ // ========== WEB APPLICATION PERMISSIONS =====================================
128
+
129
+
130
+ // These permissions are granted by default to all web applications
131
+ // In addition, a web application will be given a read FilePermission
132
+ // for all files and directories in its document root.
133
+ grant {
134
+ // Required for JNDI lookup of named JDBC DataSource's and
135
+ // javamail named MimePart DataSource used to send mail
136
+ permission java.util.PropertyPermission "java.home", "read";
137
+ permission java.util.PropertyPermission "java.naming.*", "read";
138
+ permission java.util.PropertyPermission "javax.sql.*", "read";
139
+
140
+ // OS Specific properties to allow read access
141
+ permission java.util.PropertyPermission "os.name", "read";
142
+ permission java.util.PropertyPermission "os.version", "read";
143
+ permission java.util.PropertyPermission "os.arch", "read";
144
+ permission java.util.PropertyPermission "file.separator", "read";
145
+ permission java.util.PropertyPermission "path.separator", "read";
146
+ permission java.util.PropertyPermission "line.separator", "read";
147
+
148
+ // JVM properties to allow read access
149
+ permission java.util.PropertyPermission "java.version", "read";
150
+ permission java.util.PropertyPermission "java.vendor", "read";
151
+ permission java.util.PropertyPermission "java.vendor.url", "read";
152
+ permission java.util.PropertyPermission "java.class.version", "read";
153
+ permission java.util.PropertyPermission "java.specification.version", "read";
154
+ permission java.util.PropertyPermission "java.specification.vendor", "read";
155
+ permission java.util.PropertyPermission "java.specification.name", "read";
156
+
157
+ permission java.util.PropertyPermission "java.vm.specification.version", "read";
158
+ permission java.util.PropertyPermission "java.vm.specification.vendor", "read";
159
+ permission java.util.PropertyPermission "java.vm.specification.name", "read";
160
+ permission java.util.PropertyPermission "java.vm.version", "read";
161
+ permission java.util.PropertyPermission "java.vm.vendor", "read";
162
+ permission java.util.PropertyPermission "java.vm.name", "read";
163
+
164
+ // Required for OpenJMX
165
+ permission java.lang.RuntimePermission "getAttribute";
166
+
167
+ // Allow read of JAXP compliant XML parser debug
168
+ permission java.util.PropertyPermission "jaxp.debug", "read";
169
+
170
+ // All JSPs need to be able to read this package
171
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.tomcat";
172
+
173
+ // Precompiled JSPs need access to these packages.
174
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.jasper.el";
175
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.jasper.runtime";
176
+ permission java.lang.RuntimePermission
177
+ "accessClassInPackage.org.apache.jasper.runtime.*";
178
+
179
+ // Applications using WebSocket need to be able to access these packages
180
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.tomcat.websocket";
181
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.tomcat.websocket.server";
182
+ };
183
+
184
+
185
+ // The Manager application needs access to the following packages to support the
186
+ // session display functionality. It also requires the custom Tomcat
187
+ // DeployXmlPermission to enable the use of META-INF/context.xml
188
+ // These settings support the following configurations:
189
+ // - default CATALINA_HOME == CATALINA_BASE
190
+ // - CATALINA_HOME != CATALINA_BASE, per instance Manager in CATALINA_BASE
191
+ // - CATALINA_HOME != CATALINA_BASE, shared Manager in CATALINA_HOME
192
+ grant codeBase "file:${catalina.base}/webapps/manager/-" {
193
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina";
194
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.ha.session";
195
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.manager";
196
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.manager.util";
197
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.util";
198
+ permission org.apache.catalina.security.DeployXmlPermission "manager";
199
+ };
200
+ grant codeBase "file:${catalina.home}/webapps/manager/-" {
201
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina";
202
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.ha.session";
203
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.manager";
204
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.manager.util";
205
+ permission java.lang.RuntimePermission "accessClassInPackage.org.apache.catalina.util";
206
+ permission org.apache.catalina.security.DeployXmlPermission "manager";
207
+ };
208
+
209
+ // The Host Manager application needs the custom Tomcat DeployXmlPermission to
210
+ // enable the use of META-INF/context.xml
211
+ // These settings support the following configurations:
212
+ // - default CATALINA_HOME == CATALINA_BASE
213
+ // - CATALINA_HOME != CATALINA_BASE, per instance Host Manager in CATALINA_BASE
214
+ // - CATALINA_HOME != CATALINA_BASE, shared Host Manager in CATALINA_HOME
215
+ grant codeBase "file:${catalina.base}/webapps/host-manager/-" {
216
+ permission org.apache.catalina.security.DeployXmlPermission "host-manager";
217
+ };
218
+ grant codeBase "file:${catalina.home}/webapps/host-manager/-" {
219
+ permission org.apache.catalina.security.DeployXmlPermission "host-manager";
220
+ };
221
+
222
+
223
+ // You can assign additional permissions to particular web applications by
224
+ // adding additional "grant" entries here, based on the code base for that
225
+ // application, /WEB-INF/classes/, or /WEB-INF/lib/ jar files.
226
+ //
227
+ // Different permissions can be granted to JSP pages, classes loaded from
228
+ // the /WEB-INF/classes/ directory, all jar files in the /WEB-INF/lib/
229
+ // directory, or even to individual jar files in the /WEB-INF/lib/ directory.
230
+ //
231
+ // For instance, assume that the standard "examples" application
232
+ // included a JDBC driver that needed to establish a network connection to the
233
+ // corresponding database and used the scrape taglib to get the weather from
234
+ // the NOAA web server. You might create a "grant" entries like this:
235
+ //
236
+ // The permissions granted to the context root directory apply to JSP pages.
237
+ // grant codeBase "file:${catalina.base}/webapps/examples/-" {
238
+ // permission java.net.SocketPermission "dbhost.mycompany.com:5432", "connect";
239
+ // permission java.net.SocketPermission "*.noaa.gov:80", "connect";
240
+ // };
241
+ //
242
+ // The permissions granted to the context WEB-INF/classes directory
243
+ // grant codeBase "file:${catalina.base}/webapps/examples/WEB-INF/classes/-" {
244
+ // };
245
+ //
246
+ // The permission granted to your JDBC driver
247
+ // grant codeBase "jar:file:${catalina.base}/webapps/examples/WEB-INF/lib/driver.jar!/-" {
248
+ // permission java.net.SocketPermission "dbhost.mycompany.com:5432", "connect";
249
+ // };
250
+ // The permission granted to the scrape taglib
251
+ // grant codeBase "jar:file:${catalina.base}/webapps/examples/WEB-INF/lib/scrape.jar!/-" {
252
+ // permission java.net.SocketPermission "*.noaa.gov:80", "connect";
253
+ // };
254
+
255
+ // To grant permissions for web applications using packed WAR files, use the
256
+ // Tomcat specific WAR url scheme.
257
+ //
258
+ // The permissions granted to the entire web application
259
+ // grant codeBase "war:file:${catalina.base}/webapps/examples.war*/-" {
260
+ // };
261
+ //
262
+ // The permissions granted to a specific JAR
263
+ // grant codeBase "war:file:${catalina.base}/webapps/examples.war*/WEB-INF/lib/foo.jar" {
265
264
  // };