/*
* Copyright (c) 1999, 2005, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
package java.sql;
import java.security.*;
/**
* The permission for which the SecurityManager
will check
* when code that is running in an applet calls the
* DriverManager.setLogWriter
method or the
* DriverManager.setLogStream
(deprecated) method.
* If there is no SQLPermission
object, these methods
* throw a java.lang.SecurityException
as a runtime exception.
*
* A SQLPermission
object contains
* a name (also referred to as a "target name") but no actions
* list; there is either a named permission or there is not.
* The target name is the name of the permission (see below). The
* naming convention follows the hierarchical property naming convention.
* In addition, an asterisk
* may appear at the end of the name, following a ".", or by itself, to
* signify a wildcard match. For example: loadLibrary.*
* or *
is valid,
* but *loadLibrary
or a*b
is not valid.
*
* The following table lists all the possible SQLPermission
target names.
* Currently, the only name allowed is setLog
.
* The table gives a description of what the permission allows
* and a discussion of the risks of granting code the permission.
*
* *
Permission Target Name | *What the Permission Allows | *Risks of Allowing this Permission | *
---|---|---|
setLog | *Setting of the logging stream | *This is a dangerous permission to grant. * The contents of the log may contain usernames and passwords, * SQL statements, and SQL data. | *
Policy Tool
to create an
* SQLPermission
in a policy file. A programmer does
* not use a constructor directly to create an instance of SQLPermission
* but rather uses a tool.
* @since 1.3
* @see java.security.BasicPermission
* @see java.security.Permission
* @see java.security.Permissions
* @see java.security.PermissionCollection
* @see java.lang.SecurityManager
*
*/
public final class SQLPermission extends BasicPermission {
/**
* Creates a new SQLPermission
object with the specified name.
* The name is the symbolic name of the SQLPermission
; currently,
* the only name allowed is "setLog".
*
* @param name the name of this SQLPermission
object, which must
* be setLog
* @throws NullPointerException if name
is null
.
* @throws IllegalArgumentException if name
is empty.
*/
public SQLPermission(String name) {
super(name);
}
/**
* Creates a new SQLPermission
object with the specified name.
* The name is the symbolic name of the SQLPermission
; the
* actions String
is currently unused and should be
* null
.
*
* @param name the name of this SQLPermission
object, which must
* be setLog
* @param actions should be null
* @throws NullPointerException if name
is null
.
* @throws IllegalArgumentException if name
is empty.
*/
public SQLPermission(String name, String actions) {
super(name, actions);
}
/**
* Private serial version unique ID to ensure serialization
* compatibility.
*/
static final long serialVersionUID = -1439323187199563495L;
}