function stringlengths 87 5.09k | validationType stringclasses 2
values | fixed stringlengths 289 7.12k |
|---|---|---|
@RequiresApi<method*start>android.support.annotation.RequiresApi<method*end>(api<method*start>android.support.annotation.RequiresApi.api<method*end> = Build.VERSION_CODES.M<method*start>android.os.Build.VERSION_CODES.M<method*end>)
public static String<method*start>java.lang.String<method*end>[] checkPermission(Context... | annotation | @RequiresApi<method*start>android.support.annotation.RequiresApi<method*end>(api<method*start>android.support.annotation.RequiresApi.api<method*end> = Build.VERSION_CODES.M<method*start>android.os.Build.VERSION_CODES.M<method*end>)
public static String<method*start>java.lang.String<method*end>[] checkPermission(Context... |
public void checkReadPermission(IRI<method*start>org.apache.clerezza.IRI<method*end> GraphUri) {
try {
AccessController.checkPermission<method*start>java.security.AccessController.checkPermission<method*end>(new AllPermission<method*start>java.security.AllPermission<method*end>());
} ca... | conventional | public void checkReadPermission(IRI<method*start>org.apache.clerezza.IRI<method*end> GraphUri) {
if (GraphUri.equals<method*start>org.apache.clerezza.IRI.equals<method*end>(permissionGraphName)) {
// priviledged during verfification
return;
}
SecurityManager<method*start>java.lang.SecurityMa... |
private static QuarkusSecurityIdentityio.quarkus.security.runtime.QuarkusSecurityIdentity augmentIdentity(SecurityIdentityio.quarkus.security.identity.SecurityIdentity securityIdentity, Stringjava.lang.String accessToken, Stringjava.lang.String refreshToken, RoutingContextio.vertx.ext.web.RoutingContext context) {
... | conventional | private static QuarkusSecurityIdentity<method*start>io.quarkus.security.runtime.QuarkusSecurityIdentity<method*end> augmentIdentity(SecurityIdentity<method*start>io.quarkus.security.identity.SecurityIdentity<method*end> securityIdentity, String<method*start>java.lang.String<method*end> accessToken, String<method*start>... |
protected boolean verifyStaticPermission(Principal<method*start>java.security.Principal<method*end> principal, final Permission<method*start>java.security.Permission<method*end> permission) {
Subject<method*start>javax.security.auth.Subject<method*end> subject = new Subject<method*start>javax.security.auth.Subject<... | conventional | protected boolean verifyStaticPermission(Principal<method*start>java.security.Principal<method*end> principal, final Permission<method*start>java.security.Permission<method*end> permission) {
Subject<method*start>javax.security.auth.Subject<method*end> subject = new Subject<method*start>javax.security.auth.Subject<... |
private boolean checkPerm(Permission<method*start>java.security.Permission<method*end> p, Class<method*start>java.lang.Class<method*end> caller) {
if (LOG.isLoggable<method*start>java.util.logging.Logger.isLoggable<method*end>(Level.FINE<method*start>java.util.logging.Level.FINE<method*end>)) {
LOG.fine<met... | conventional | private boolean checkPerm(Permission<method*start>java.security.Permission<method*end> p, Class<method*start>java.lang.Class<method*end> caller) {
if (LOG.isLoggable<method*start>java.util.logging.Logger.isLoggable<method*end>(Level.FINE<method*start>java.util.logging.Level.FINE<method*end>)) {
LOG.fine<met... |
public static void forbidExit() {
final SecurityManager<method*start>java.lang.SecurityManager<method*end> securityManager = new SecurityManager<method*start>java.lang.SecurityManager<method*end>() {
System<method*start>java.lang.System<method*end>.setSecurityManager(securityManager);
} | annotation | public static void forbidExit() {
final SecurityManager<method*start>java.lang.SecurityManager<method*end> securityManager = new SecurityManager<method*start>java.lang.SecurityManager<method*end>() {
@Override
public void checkPermission(Permission<method*start>java.security.Permission<method*end> ... |
@Override<method*start>java.lang.Override<method*end>
public void onClick(View<method*start>android.view.View<method*end> v) {
view<method*start>com.journaldev.runtimepermissions.MainActivity.view<method*end> = v;
int id = v.getId<method*start>android.view.View.getId<method*end>();
switch(id) {
case... | annotation | @Override<method*start>java.lang.Override<method*end>
public void onClick(View<method*start>android.view.View<method*end> v) {
view<method*start>com.journaldev.runtimepermissions.MainActivity.view<method*end> = v;
int id = v.getId<method*start>android.view.View.getId<method*end>();
switch(id) {
case... |
@SuppressWarnings("fallthrough")
private void cd(String path) throws URI.MalformedURIException, RemoteException, SRMException, InterruptedException {
if (!path.endsWith("/")) {
path = path + "/";
}
URI uri = new URI(pwd, path);
checkValidPath(fs.stat(uri).getType() == TFileType.DIRECTORY, "Not a... | annotation | @SuppressWarnings("fallthrough")
private void cd(String<method*start>java.lang.String<method*end> path) throws URI.MalformedURIException<method*start>org.apache.axis.types.URI.MalformedURIException<method*end>, RemoteException<method*start>java.rmi.RemoteException<method*end>, SRMException<method*start>org.dcache.srm.S... |
void checkPackageList(String packageName, final String restriction, String permission) {
if (packageName == null)
throw new NullPointerException();
String list = (String) AccessController.doPrivileged(new PrivilegedAction() {
public Object run() {
return Security.getProperty(restric... | conventional | void checkPackageList(String<method*start>java.lang.String<method*end> packageName, final String<method*start>java.lang.String<method*end> restriction, String<method*start>java.lang.String<method*end> permission) {
if (packageName == null)
throw new NullPointerException<method*start>java.lang.NullPointerExc... |
private static void checkMemberAccess(final Class<method*start>java.lang.Class<method*end><?> theClass, final Member<method*start>java.lang.reflect.Member<method*end> theMember) {
if (theMember == null || Modifier.isPublic<method*start>java.lang.reflect.Modifier.isPublic<method*end>(theMember.getModifiers<method*s... | conventional | private static void checkMemberAccess(final Class<method*start>java.lang.Class<method*end><?> theClass, final Member<method*start>java.lang.reflect.Member<method*end> theMember) {
// 1) bypass the permission check when theMember is public or null.
if (theMember == null || Modifier.isPublic<method*start>java.lan... |
@Override
public void checkCurrentUserPermissions(final List<method*start>java.util.List<method*end><Permission<method*start>org.killbill.billing.security.Permission<method*end>> permissions, final Logical<method*start>org.killbill.billing.security.Logical<method*end> logical, final TenantContext<method*start>org.killb... | annotation | @Override
public void checkCurrentUserPermissions(final List<method*start>java.util.List<method*end><Permission<method*start>org.killbill.billing.security.Permission<method*end>> permissions, final Logical<method*start>org.killbill.billing.security.Logical<method*end> logical, final TenantContext<method*start>org.killb... |
public boolean preHandle(HttpServletRequest request, HttpServletResponse response, Object handler) throws Exception {
// 请求的路径
String contextPath = request.getServletPath();
String url = request.getScheme() + "://" + request.getServerName() + ":" + request.getServerPort() + request.getServletPath();
if ... | conventional | public boolean preHandle(HttpServletRequest<method*start>javax.servlet.http.HttpServletRequest<method*end> request, HttpServletResponse<method*start>javax.servlet.http.HttpServletResponse<method*end> response, Object<method*start>java.lang.Object<method*end> handler) throws Exception<method*start>java.lang.Exception<me... |
public static Token<method*start>org.wf.jwtp.provider.Token<method*end> parseToken(HttpServletRequest<method*start>javax.servlet.http.HttpServletRequest<method*end> request, TokenStore<method*start>org.wf.jwtp.provider.TokenStore<method*end> tokenStore) {
Token<method*start>org.wf.jwtp.provider.Token<method*end> to... | conventional | public static Token<method*start>org.wf.jwtp.provider.Token<method*end> parseToken(HttpServletRequest<method*start>javax.servlet.http.HttpServletRequest<method*end> request, TokenStore<method*start>org.wf.jwtp.provider.TokenStore<method*end> tokenStore) {
Token<method*start>org.wf.jwtp.provider.Token<method*end> to... |
@Override<method*start>java.lang.Override<method*end>
@CallerSensitive<method*start>jdk.internal.reflect.CallerSensitive<method*end>
public void setAccessible(boolean flag) {
// 如果需要开启访问权限
// 获取setAccessible()的调用者所处的类
Class<method*start>java.lang.Class<method*end><?> caller = Re... | annotation | @Override<method*start>java.lang.Override<method*end>
@CallerSensitive<method*start>jdk.internal.reflect.CallerSensitive<method*end>
public void setAccessible(boolean flag) {
AccessibleObject.checkPermission<method*start>java.lang.reflect.AccessibleObject.checkPermission<method*end>();
// 如果需要开启访问权限
if (fla... |
private st<method*start>java.lang.Class<method*end>atic void checkProxyAcc<method*start>java.lang.ClassLoader<method*end>ess(Class<?> c<method*start>java.lang.Class<method*end>aller, ClassLoader loader, Class<?>... inter<method*start>java.lang.SecurityManager<method*end>faces) {
retur<method*start>java.lan... | conventional | private st<method*start>java.lang.Class<method*end>atic void checkProxyAcc<method*start>java.lang.ClassLoader<method*end>ess(Class<?> c<method*start>java.lang.Class<method*end>aller, ClassLoader loader, Class<?>... inter<method*start>java.lang.SecurityManager<method*end>faces) {
SecurityManage<method*start>java.lan... |
@WrapInTransaction
@Override
public FieldVariable<method*start>com.dotcms.contenttype.model.field.FieldVariable<method*end> save(final FieldVariable<method*start>com.dotcms.contenttype.model.field.FieldVariable<method*end> var, final User<method*start>com.liferay.portal.model.User<method*end> user) throws DotDataExcept... | annotation | @WrapInTransaction
@Override
public FieldVariable<method*start>com.dotcms.contenttype.model.field.FieldVariable<method*end> save(final FieldVariable<method*start>com.dotcms.contenttype.model.field.FieldVariable<method*end> var, final User<method*start>com.liferay.portal.model.User<method*end> user) throws DotDataExce... |
@Override
public AuthorizeForAutoscaleV4Response authorizeForAutoscale(String crn, String userId, String tenant, String permission) {
AuthorizeForAutoscaleV4Response response = new AuthorizeForAutoscaleV4Response();
try {
restRequestThreadLocalService.setCloudbreakUserByUsernameAndTenant(userId, tenant)... | conventional | @Override<method*start>java.lang.Override<method*end>
public AuthorizeForAutoscaleV4Response<method*start>com.sequenceiq.cloudbreak.api.endpoint.v4.autoscales.response.AuthorizeForAutoscaleV4Response<method*end> authorizeForAutoscale(String<method*start>java.lang.String<method*end> crn, String<method*start>java.lang.St... |
public AccessControlContext delegatedContext(AccessControlContext authenticatedACC, Subject delegatedSubject, boolean removeCallerContext) throws SecurityException {
throw new SecurityException("Illegal AccessControlContext: null");
}
// Check if the subject delegation permission allows the
// ... | conventional | public AccessControlContext<method*start>java.security.AccessControlContext<method*end> delegatedContext(AccessControlContext<method*start>java.security.AccessControlContext<method*end> authenticatedACC, Subject<method*start>javax.security.auth.Subject<method*end> delegatedSubject, boolean removeCallerContext) throws S... |
public void secure(final Account operatedAccount, final String permission, SecuredType type, UserIdentityContext userIdentityContext) throws AuthorizationException {
if (operatedAccount == null) {
// if operatedAccount is NULL, we'll probably return a 404. But let's handle that in a central place.
... | conventional | public void secure(final Account<method*start>org.restcomm.connect.dao.entities.Account<method*end> operatedAccount, final String<method*start>java.lang.String<method*end> permission, SecuredType<method*start>org.restcomm.connect.http.security.PermissionEvaluator.SecuredType<method*end> type<method*start>org.restcomm.c... |
@Setup<method*start>org.openjdk.jmh.annotations.Setup<method*end>
public void makeFinder() throws Throwable<method*start>java.lang.Throwable<method*end> {
defaultThriftMessageClassFinder<method*start>com.linecorp.armeria.common.thrift.text.StackTracingBenchmark.defaultThriftMessageClassFinder<method*end> = new Defa... | annotation | @Setup<method*start>org.openjdk.jmh.annotations.Setup<method*end>
public void makeFinder() throws Throwable<method*start>java.lang.Throwable<method*end> {
defaultThriftMessageClassFinder<method*start>com.linecorp.armeria.common.thrift.text.StackTracingBenchmark.defaultThriftMessageClassFinder<method*end> = new Defa... |
public static <T> T runWithRestrictedPermissions(PrivilegedExceptionAction<T> action, Permission... permissions) throws Exception {
assumeTrue("runWithRestrictedPermissions requires a SecurityManager enabled", System.getSecurityManager() != null);
final AccessControlContext ctx = new AccessControlCont... | conventional | public static <T> T runWithRestrict<method*start>java.lang.Exception<method*end>edPermissions(Privile<method*start>org.apache.lucene.util.LuceneTestCase.assumeTrue<method*end>gedExceptionAction<T> action, Permission... permissions) throws Exception <method*start>java.lang.System<method*end>{
assumeTrue("runWithRest... |
public static synchronized MBeanServer<method*start>javax.management.MBeanServer<method*end> getPlatformMBeanServer() {
Permission<method*start>java.security.Permission<method*end> perm = new MBeanServerPermission<method*start>javax.management.MBeanServerPermission<method*end>("createMBeanServer");
s... | conventional | public static synchronized MBeanServer<method*start>javax.management.MBeanServer<method*end> getPlatformMBeanServer() {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (sm != null) {
Perm... |
public void setContextClassLoader(ClassLoader cl) {
contextClassLoader = cl;
} | conventional | public void setContextClassLoader(ClassLoader<method*start>java.lang.ClassLoader<method*end> cl) {
/*[PR 1FCA807]*/
SecurityManager<method*start>java.lang.SecurityManager<method*end> currentManager = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
// if there is a s... |
public boolean hasPermissionForActivity(Intent intent, String srcPackage) {
ResolveInfo target = mPm.resolveActivity(intent, 0);
if (target == null) {
// Not a valid target
return false;
}
if (TextUtils.isEmpty(target.activityInfo.permission)) {
// No permission is needed
... | conventional | public boolean hasPermissionForActivity(Intent<method*start>android.content.Intent<method*end> intent, String<method*start>java.lang.String<method*end> srcPackage) {
ResolveInfo<method*start>android.content.pm.ResolveInfo<method*end> target = mPm.resolveActivity<method*start>android.content.pm.PackageManager.resolv... |
public static boolean hasPermissionForActivity(Context<method*start>android.content.Context<method*end> context, Intent<method*start>android.content.Intent<method*end> intent, String<method*start>java.lang.String<method*end> srcPackage) {
PackageManager<method*start>android.content.pm.PackageManager<method*end> pm ... | conventional | public static boolean hasPermissionForActivity(Context<method*start>android.content.Context<method*end> context, Intent<method*start>android.content.Intent<method*end> intent, String<method*start>java.lang.String<method*end> srcPackage) {
PackageManager<method*start>android.content.pm.PackageManager<method*end> pm ... |
private JarFile<method*start>java.util.jar.JarFile<method*end> getCachedJarFile(URL<method*start>java.net.URL<method*end> url) {
JarFile<method*start>java.util.jar.JarFile<method*end> result = (JarFile<method*start>java.util.jar.JarFile<method*end>) fileCache.get<method*start>java.util.HashMap.get<method*end>(url);... | conventional | private JarFile<method*start>java.util.jar.JarFile<method*end> getCachedJarFile(URL<method*start>java.net.URL<method*end> url) {
JarFile<method*start>java.util.jar.JarFile<method*end> result = (JarFile<method*start>java.util.jar.JarFile<method*end>) fileCache.get<method*start>java.util.HashMap.get<method*end>(url);... |
private JarFile<method*start>java.util.jar.JarFile<method*end> getCachedJarFile(URL<method*start>java.net.URL<method*end> url) {
JarFile<method*start>java.util.jar.JarFile<method*end> result = fileCache.get<method*start>java.util.HashMap.get<method*end>(URLUtil.urlNoFragString<method*start>sun.net.util.URLUtil... | conventional | private JarFile<method*start>java.util.jar.JarFile<method*end> getCachedJarFile(URL<method*start>java.net.URL<method*end> url) {
assert Thread.holdsLock<method*start>java.lang.Thread.holdsLock<method*end>(instance);
JarFile<method*start>java.util.jar.JarFile<method*end> result = fileCache.get<method*start>java.... |
public final ClassLoader<method*start>java.lang.ClassLoader<method*end> getClassLoader(ObjectName<method*start>javax.management.ObjectName<method*end> name) {
ClassLoader<method*start>java.lang.ClassLoader<method*end> instance = loadersWithNames.get<method*start>java.util.Map.get<method*end>(name);
if (instance... | conventional | public final ClassLoader<method*start>java.lang.ClassLoader<method*end> getClassLoader(ObjectName<method*start>javax.management.ObjectName<method*end> name) {
ClassLoader<method*start>java.lang.ClassLoader<method*end> instance = loadersWithNames.get<method*start>java.util.Map.get<method*end>(name);
if (instance... |
@CallerSensitive
public final ClassLoader<method*start>java.lang.ClassLoader<method*end> getParent() {
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
ClassLoader<method*start>java.lan... | annotation | @CallerSensitive
public final ClassLoader<method*start>java.lang.ClassLoader<method*end> getParent() {
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (security != null) {
ClassLoad... |
@Override
public void deleteProcRoleBinding(String procId, ProcRoleRequestDto procRoleRequestDto) throws WecubeCoreException {
ProcRoleBindingEntity.permissionEnum permissionEnum = transferPermissionStrToEnum(procRoleRequestDto.getPermission());
Optional<List<ProcRoleBindingEntity>> foundMgmtData ... | annotation | @Override<method*start>java.lang.Override<method*end>
public void deleteProcRoleBinding(String<method*start>java.lang.String<method*end> procId, ProcRoleRequestDto<method*start>com.webank.wecube.platform.core.dto.workflow.ProcRoleRequestDto<method*end> procRoleRequestDto) throws WecubeCoreException<method*start>com.web... |
@Deprecated
public boolean checkTopLevelWindow(Object window) {
if (window == null) {
throw new NullPointerException("window can't be null");
}
perm = SecurityConstants.ALL_PERMISSION;
}
try {
return true;
} catch (SecurityException se) {
// just return false
}
... | conventional | @Deprecated<method*start>java.lang.Deprecated<method*end>
public boolean checkTopLevelWindow(Object<method*start>java.lang.Object<method*end> window) {
if (window == null) {
throw new NullPointerException<method*start>java.lang.NullPointerException<method*end>("window can't be null");
}
Permission<m... |
@Override<method*start>java.lang.Override<method*end>
public Enumeration<method*start>java.util.Enumeration<method*end> findEntries(String<method*start>java.lang.String<method*end> path, String<method*start>java.lang.String<method*end> filePattern, boolean recurse) {
Object<method*start>java.lang.Object<method*end>... | annotation | @Override<method*start>java.lang.Override<method*end>
public Enumeration<method*start>java.util.Enumeration<method*end> findEntries(String<method*start>java.lang.String<method*end> path, String<method*start>java.lang.String<method*end> filePattern, boolean recurse) {
Object<method*start>java.lang.Object<method*end>... |
@Override<method*start>java.lang.Override<method*end>
public Path<method*start>java.nio.file.Path<method*end> readSymbolicLink(Path<method*start>java.nio.file.Path<method*end> obj1) throws IOException<method*start>java.io.IOException<method*end> {
WindowsPath<method*start>sun.nio.fs.WindowsPath<method*end> link = W... | annotation | @Override<method*start>java.lang.Override<method*end>
public Path<method*start>java.nio.file.Path<method*end> readSymbolicLink(Path<method*start>java.nio.file.Path<method*end> obj1) throws IOException<method*start>java.io.IOException<method*end> {
WindowsPath<method*start>sun.nio.fs.WindowsPath<method*end> link = W... |
private String<method*start>java.lang.String<method*end> getRealRoot(boolean isUser) {
// not sure about this, we should have already these permissions...
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<meth... | conventional | private String<method*start>java.lang.String<method*end> getRealRoot(boolean isUser) {
// not sure about this, we should have already these permissions...
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<meth... |
@ImmediateService<method*start>org.objectweb.proactive.annotation.ImmediateService<method*end>
public boolean removeJobs(List<method*start>java.util.List<method*end><JobId<method*start>org.ow2.proactive.scheduler.common.job.JobId<method*end>> jobIds) throws NotConnectedException<method*start>org.ow2.proactive.scheduler... | annotation | @ImmediateService<method*start>org.objectweb.proactive.annotation.ImmediateService<method*end>
public boolean removeJobs(List<method*start>java.util.List<method*end><JobId<method*start>org.ow2.proactive.scheduler.common.job.JobId<method*end>> jobIds) throws NotConnectedException<method*start>org.ow2.proactive.scheduler... |
public static synchronized MBeanServer<method*start>javax.management.MBeanServer<method*end> getPlatformMBeanServer() {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
Permission<method*sta... | conventional | public static synchronized MBeanServer<method*start>javax.management.MBeanServer<method*end> getPlatformMBeanServer() {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (sm != null) {
Perm... |
@Override
public void onRequestPermissionsResult(int requestCode, @NonNull<method*start>androidx.annotation.NonNull<method*end> String[] permissions, @NonNull<method*start>androidx.annotation.NonNull<method*end> int[] grantResults) {
super.onRequestPermissionsResult<method*start>androidx.appcompat.app.AppCompatActi... | annotation | @Override
public void onRequestPermissionsResult(int requestCode, @NonNull<method*start>androidx.annotation.NonNull<method*end> String[] permissions, @NonNull<method*start>androidx.annotation.NonNull<method*end> int[] grantResults) {
super.onRequestPermissionsResult<method*start>androidx.appcompat.app.AppCompatActi... |
public boolean hasAccess(final WikiContext<method*start>org.apache.wiki.WikiContext<method*end> context, final HttpServletResponse<method*start>javax.servlet.http.HttpServletResponse<method*end> response, final boolean redirect) throws IOException<method*start>java.io.IOException<method*end> {
final boolean allowed... | conventional | public boolean hasAccess(final WikiContext<method*start>org.apache.wiki.WikiContext<method*end> context, final HttpServletResponse<method*start>javax.servlet.http.HttpServletResponse<method*end> response, final boolean redirect) throws IOException<method*start>java.io.IOException<method*end> {
final boolean allowed... |
@Override
public boolean hasPermissionOffline(String<method*start>java.lang.String<method*end> name, PermissionNode<method*start>fr.xephi.authme.permission.PermissionNode<method*end> node) {
User<method*start>net.luckperms.api.model.user.User<method*end> user = luckPerms.getUserManager<method*start>net.luckperms.ap... | annotation | @Override
public boolean hasPermissionOffline(String<method*start>java.lang.String<method*end> name, PermissionNode<method*start>fr.xephi.authme.permission.PermissionNode<method*end> node) {
User<method*start>net.luckperms.api.model.user.User<method*end> user = luckPerms.getUserManager<method*start>net.luckperms.ap... |
private static void checkMBeanTrustPermission(final Class<method*start>java.lang.Class<method*end> theClass) throws
Permission<method*start>java.security.Permission<method*end> perm = new MBeanTrustPermission<method*start>javax.management.MBeanTrustPermission<method*end>("register");
PrivilegedAction<... | conventional | private static void checkMBeanTrustPermission(final Class<method*start>java.lang.Class<method*end> theClass) throws SecurityException<method*start>java.lang.SecurityException<method*end> {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>java.lang.System... |
@Override<method*start>java.lang.Override<method*end>
public void createLink(Path<method*start>java.nio.file.Path<method*end> linkPath, Path<method*start>java.nio.file.Path<method*end> targetPath) throws IOException<method*start>java.io.IOException<method*end> {
WindowsPath<method*start>sun.nio.fs.WindowsPath<metho... | annotation | @Override<method*start>java.lang.Override<method*end>
public void createLink(Path<method*start>java.nio.file.Path<method*end> linkPath, Path<method*start>java.nio.file.Path<method*end> targetPath) throws IOException<method*start>java.io.IOException<method*end> {
WindowsPath<method*start>sun.nio.fs.WindowsPath<metho... |
@Override<method*start>java.lang.Override<method*end>
public String<method*start>java.lang.String<method*end> registerConfigProvider(String<method*start>java.lang.String<method*end> className, Map<method*start>java.util.Map<method*end> properties, String<method*start>java.lang.String<method*end> layer, String<method*st... | annotation | @Override<method*start>java.lang.Override<method*end>
public String<method*start>java.lang.String<method*end> registerConfigProvider(String<method*start>java.lang.String<method*end> className, Map<method*start>java.util.Map<method*end> properties, String<method*start>java.lang.String<method*end> layer, String<method*st... |
public static synchronized boolean checkRemoveCallerContext(Subject subject) {
try {
final Principal[] dp = subject.getPrincipals().toArray(new Principal[0]);
for (int i = 0; i < dp.length; i++) {
final String pname = dp[i].getClass().getName() + "." + dp[i].getName();
final ... | conventional | public static synchronized boolean checkRemoveCallerContext(Subject<method*start>javax.security.auth.Subject<method*end> subject) {
try {
final Principal<method*start>java.security.Principal<method*end>[] dp = subject.getPrincipals<method*start>javax.security.auth.Subject.getPrincipals<method*end>().toArray... |
@Ove<method*start>java.util.Set<method*end>rride
public Set<String> getCallerGroups(Creden<method*start>javax.security.enterprise.identitystore.CredentialValidationResult<method*end>tialValidationResult validationResult) {
LdapContext searchContext = cre<method*start>org.glassfish.soteria.identitystores.Ldap... | annotation | @Ove<method*start>java.util.Set<method*end>rride
public Set<String> getCallerGroups(Creden<method*start>javax.security.enterprise.identitystore.CredentialValidationResult<method*end>tialValidationResult validationResult) {
// Make sure caller has permission to invoke this method
SecurityManager secu<method*star... |
@Override
@ImmediateService
public boolean killJobs(List<String> jobIds) throws NotConnectedException, PermissionException {
if (jobIds.isEmpty()) {
return false;
}
List<JobId> jobIdsConverted = jobIds.stream().map(JobIdImpl::makeJobId).collect(Collectors.toList());
return schedulingService.kil... | annotation | @Override<method*start>java.lang.Override<method*end>
@ImmediateService<method*start>org.objectweb.proactive.annotation.ImmediateService<method*end>
public boolean killJobs(List<method*start>java.util.List<method*end><String<method*start>java.lang.String<method*end>> jobIds) throws NotConnectedException<method*start>or... |
@Implementation(minSdk<method*start>org.robolectric.annotation.Implements.minSdk<method*end> = M<method*start>android.os.Build.VERSION_CODES.M<method*end>)
protected void grantRuntimePermission(String<method*start>java.lang.String<method*end> packageName, String<method*start>java.lang.String<method*end> permissionName,... | annotation | @Implementation(minSdk<method*start>org.robolectric.annotation.Implements.minSdk<method*end> = M<method*start>android.os.Build.VERSION_CODES.M<method*end>)
protected void grantRuntimePermission(String<method*start>java.lang.String<method*end> packageName, String<method*start>java.lang.String<method*end> permissionName,... |
public byte[] getHardwareAddress() throws SocketException {
catch (SecurityException e) {
if (!getInetAddresses().hasMoreElements()) {
// don't have connect permission to any local address
return null;
}
}
}
for (InetAddress addr : add... | conventional | public byte[] getHardwareAddress() throws SocketException<method*start>java.net.SocketException<method*end> {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sec = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (sec != null) {
try {
... |
@Override<method*start>java.lang.Override<method*end>
public void setAdmin(String<method*start>java.lang.String<method*end> domain, String<method*start>java.lang.String<method*end> requestAdminLoginName, String<method*start>java.lang.String<method*end> targetUserLoginName, Admin<method*start>org.krakenapps.dom.model.Ad... | annotation | @Override<method*start>java.lang.Override<method*end>
public void setAdmin(String<method*start>java.lang.String<method*end> domain, String<method*start>java.lang.String<method*end> requestAdminLoginName, String<method*start>java.lang.String<method*end> targetUserLoginName, Admin<method*start>org.krakenapps.dom.model.Ad... |
public byte[] getHardwareAddress() throws SocketException<method*start>java.net.SocketException<method*end> {
sec.checkPermission<method*start>java.lang.SecurityManager.checkPermission<method*end>(new NetPermission("getNetworkInformation"));
} catch (SecurityException e) {
if (!getI... | conventional | public byte[] getHardwareAddress() throws SocketException<method*start>java.net.SocketException<method*end> {
SecurityManager<method*start>java.lang.SecurityManager<method*end> sec = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (sec != null) {
try {
... |
public StackTraceElement<method*start>java.lang.StackTraceElement<method*end>[] getStackTrace() {
if (this != Thread.currentThread<method*start>java.lang.Thread.currentThread<method*end>()) {
if (!isAlive()) {
return EMPTY_STACK_TRACE;
}
StackTraceElement<method*start>ja... | conventional | public StackTraceElement<method*start>java.lang.StackTraceElement<method*end>[] getStackTrace() {
if (this != Thread.currentThread<method*start>java.lang.Thread.currentThread<method*end>()) {
// check for getStackTrace permission
SecurityManager security = System.getSecurityManager<method*start>java... |
@Override<method*start>java.lang.Override<method*end>
public Enumeration<method*start>java.util.Enumeration<method*end> getResources(String<method*start>java.lang.String<method*end> name) throws IOException<method*start>java.io.IOException<method*end> {
Object<method*start>java.lang.Object<method*end> sm = System.g... | annotation | @Override<method*start>java.lang.Override<method*end>
public Enumeration<method*start>java.util.Enumeration<method*end> getResources(String<method*start>java.lang.String<method*end> name) throws IOException<method*start>java.io.IOException<method*end> {
Object<method*start>java.lang.Object<method*end> sm = System.g... |
private Bitmap<method*start>android.graphics.Bitmap<method*end> getThumbnailOfLastPhoto(Context<method*start>android.content.Context<method*end> context) {
Cursor<method*start>android.database.Cursor<method*end> cursor = MediaStore.Images.Media.query<method*start>android.provider.MediaStore.Images.Media.query<... | conventional | private Bitmap<method*start>android.graphics.Bitmap<method*end> getThumbnailOfLastPhoto(Context<method*start>android.content.Context<method*end> context) {
boolean canReadExternalStorage = context.checkPermission<method*start>android.content.Context.checkPermission<method*end>(Manifest.permission.READ_EXTERNAL_STOR... |
protected ModelAndView onSubmit(HttpServletRequest request, HttpServletResponse response, Object cmd, BindException errors) throws Exception {
LoginCommand command = (LoginCommand) cmd;
UsernamePasswordToken token = new UsernamePasswordToken(command.getUsername(), command.getPassword());
try {
// 登录... | conventional | protected ModelAndView<method*start>org.springframework.web.servlet.ModelAndView<method*end> onSubmit(HttpServletRequest<method*start>javax.servlet.http.HttpServletRequest<method*end> request, HttpServletResponse<method*start>javax.servlet.http.HttpServletResponse<method*end> response, Object<method*start>java.lang.Obj... |
public void download(final Context android.content.Context context, final String java.lang.String path, final String java.lang.String name, @Nullable android.support.annotation.Nullable MessageDispatcher view) {
@Override
public void onPermissionDenied(PermissionDeniedResponsecom.karumi.dexte... | annotation | public void download(final Context<method*start>android.content.Context<method*end> context, final String<method*start>java.lang.String<method*end> path, final String<method*start>java.lang.String<method*end> name, @Nullable<method*start>android.support.annotation.Nullable<method*end> MessageDispatcher view) {
if (... |
public StackTraceElement<method*start>java.lang.StackTraceElement<method*end>[] getStackTrace() {
if (this != Thread.currentThread<method*start>java.lang.Thread.currentThread<method*end>()) {
if (!isAlive()) {
return EMPTY_STACK_TRACE;
}
StackTraceElement<method*start>ja... | conventional | public StackTraceElement<method*start>java.lang.StackTraceElement<method*end>[] getStackTrace() {
if (this != Thread.currentThread<method*start>java.lang.Thread.currentThread<method*end>()) {
// check for getStackTrace permission
SecurityManager security = System.getSecurityManager<method*start>java... |
static void check(URL<method*start>java.net.URL<method*end> url) throws IOException<method*start>java.io.IOException<method*end> {
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (security ... | conventional | static void check(URL<method*start>java.net.URL<method*end> url) throws IOException<method*start>java.io.IOException<method*end> {
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (security ... |
@Nonnull<method*start>javax.annotation.Nonnull<method*end>
@Override<method*start>java.lang.Override<method*end>
public RestAction<method*start>net.dv8tion.jda.api.requests.RestAction<method*end><Void<method*start>java.lang.Void<method*end>> moveVoiceMember(@Nonnull<method*start>javax.annotation.Nonnull<method*end> Mem... | annotation | @Nonnull<method*start>javax.annotation.Nonnull<method*end>
@Override<method*start>java.lang.Override<method*end>
public RestAction<method*start>net.dv8tion.jda.api.requests.RestAction<method*end><Void<method*start>java.lang.Void<method*end>> moveVoiceMember(@Nonnull<method*start>javax.annotation.Nonnull<method*end> Mem... |
public static boolean isCallable(@Nullable<method*start>androidx.annotation.Nullable<method*end> final PackageManager<method*start>android.content.pm.PackageManager<method*end> pm, @Nullable<method*start>androidx.annotation.Nullable<method*end> final Intent<method*start>android.content.Intent<method*end> intent) {
... | conventional | public static boolean isCallable(@Nullable<method*start>androidx.annotation.Nullable<method*end> final PackageManager<method*start>android.content.pm.PackageManager<method*end> pm, @Nullable<method*start>androidx.annotation.Nullable<method*end> final Intent<method*start>android.content.Intent<method*end> intent) {
... |
private static AccessControlContext<method*start>java.security.AccessControlContext<method*end> getSubjectContext(final Subject<method*start>javax.security.auth.Subject<method*end> subject, final AccessControlContext<method*start>java.security.AccessControlContext<method*end> context) {
final SecurityManager<method... | conventional | private static AccessControlContext<method*start>java.security.AccessControlContext<method*end> getSubjectContext(final Subject<method*start>javax.security.auth.Subject<method*end> subject, final AccessControlContext<method*start>java.security.AccessControlContext<method*end> context) {
final SecurityManager<method... |
private void createEndpoint() {
try {
Class.forName("com.sun.net.httpserver.HttpServer");
} catch (Exception e) {
throw new UnsupportedOperationException("NOT SUPPORTED");
}
WSEndpoint wse = WSEndpoint.create((Class<?>) implementor.getClass(), true, InstanceResolver.createSingleton(... | conventional | private void createEndpoint() {
// Checks permission for "publishEndpoint"
SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (sm != null) {
sm.checkPermission<method*start>java.lang.Sec... |
public void unlock(AbstractJcrNode node) throws PathNotFoundException<method*start>javax.jcr.PathNotFoundException<method*end>, LockException<method*start>javax.jcr.lock.LockException<method*end>, AccessDeniedException<method*start>javax.jcr.AccessDeniedException<method*end>, InvalidItemStateException<method*start>java... | annotation | public void unlock(AbstractJcrNode node) throws PathNotFoundException<method*start>javax.jcr.PathNotFoundException<method*end>, LockException<method*start>javax.jcr.lock.LockException<method*end>, AccessDeniedException<method*start>javax.jcr.AccessDeniedException<method*end>, InvalidItemStateException<method*start>java... |
@Override<method*start>java.lang.Override<method*end>
@ImmediateService<method*start>org.objectweb.proactive.annotation.ImmediateService<method*end>
public Page<method*start>org.ow2.proactive.scheduler.common.Page<method*end><TaskId<method*start>org.ow2.proactive.scheduler.common.task.TaskId<method*end>> getTaskIds(Str... | conventional | @Override<method*start>java.lang.Override<method*end>
@ImmediateService<method*start>org.objectweb.proactive.annotation.ImmediateService<method*end>
public Page<method*start>org.ow2.proactive.scheduler.common.Page<method*end><TaskId<method*start>org.ow2.proactive.scheduler.common.task.TaskId<method*end>> getTaskIds(Str... |
private void checkShutdownAccess() {
// assert mainLock.isHeldByCurrentThread();
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
for (Worker<method*start>java.util.concurrent.Threa... | conventional | private void checkShutdownAccess() {
// assert mainLock.isHeldByCurrentThread();
SecurityManager<method*start>java.lang.SecurityManager<method*end> security = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (security != null) {
security.checkPermission<me... |
@Override
public boolean handle(@Nonnull Message message<method*start>com.avairebot.contracts.middleware.DJCheckMessage.message<method*end>, @Nonnull MiddlewareStack stack, String<method*start>java.lang.String<method*end>... args) {
String<method*start>java.lang.String<method*end>[] arguments = ArrayUtil.toArg... | conventional | @Override
public boolean handle(@Nonnull Message message<method*start>com.avairebot.contracts.middleware.DJCheckMessage.message<method*end>, @Nonnull MiddlewareStack stack, String<method*start>java.lang.String<method*end>... args) {
CheckPermissionUtil.PermissionCheckType<method*start>com.avairebot.utilities.CheckP... |
public void run() {
// get the current subject
Subject<method*start>org.apache.shiro.subject.Subject<method*end> subject = SecurityUtils.getSubject<method*start>org.apache.shiro.SecurityUtils.getSubject<method*end>();
// Subject is not authenticated yet
Assert.isTrue<method*start>org.apache.shiro.util.A... | conventional | public void run() {
// get the current subject
Subject<method*start>org.apache.shiro.subject.Subject<method*end> subject = SecurityUtils.getSubject<method*start>org.apache.shiro.SecurityUtils.getSubject<method*end>();
// Subject is not authenticated yet
Assert.isTrue<method*start>org.apache.shiro.util.A... |
public SSLSessionContext<method*start>javax.net.ssl.SSLSessionContext<method*end> getSessionContext() {
/*
* An interim security policy until we can do something
* more specific in 1.2. Only allow trusted code (code which
* can set system properties) to get an
* SSLSessionContext. This is to lim... | conventional | public SSLSessionContext<method*start>javax.net.ssl.SSLSessionContext<method*end> getSessionContext() {
/*
* An interim security policy until we can do something
* more specific in 1.2. Only allow trusted code (code which
* can set system properties) to get an
* SSLSessionContext. This is to lim... |
public boolean hasWritePermissions(User<method*start>org.apache.roller.weblogger.pojos.User<method*end> user) throws WebloggerException<method*start>org.apache.roller.weblogger.WebloggerException<method*end> {
// global admins can hack whatever they want
GlobalPermission<method*start>org.apache.roller.weblogger... | conventional | public boolean hasWritePermissions(User<method*start>org.apache.roller.weblogger.pojos.User<method*end> user) throws WebloggerException<method*start>org.apache.roller.weblogger.WebloggerException<method*end> {
// global admins can hack whatever they want
GlobalPermission<method*start>org.apache.roller.weblogger... |
@Override<method*start>java.lang.Override<method*end>
public Path<method*start>java.nio.file.Path<method*end> readSymbolicLink(Path<method*start>java.nio.file.Path<method*end> path) throws IOException<method*start>java.io.IOException<method*end> {
// 将Path强制转换为WindowsPath
WindowsPath<method*start>sun.nio.fs.Win... | annotation | @Override<method*start>java.lang.Override<method*end>
public Path<method*start>java.nio.file.Path<method*end> readSymbolicLink(Path<method*start>java.nio.file.Path<method*end> path) throws IOException<method*start>java.io.IOException<method*end> {
// 将Path强制转换为WindowsPath
WindowsPath<method*start>sun.nio.fs.Win... |
protected String<method*start>java.lang.String<method*end> generateFullWikiRSS(final WikiContext<method*start>org.apache.wiki.WikiContext<method*end> wikiContext, final Feed<method*start>org.apache.wiki.rss.Feed<method*end> feed) {
feed.setChannelTitle<method*start>org.apache.wiki.rss.Feed.setChannelTitle<method*en... | conventional | protected String<method*start>java.lang.String<method*end> generateFullWikiRSS(final WikiContext<method*start>org.apache.wiki.WikiContext<method*end> wikiContext, final Feed<method*start>org.apache.wiki.rss.Feed<method*end> feed) {
feed.setChannelTitle<method*start>org.apache.wiki.rss.Feed.setChannelTitle<method*en... |
public int hasUserDataPermission(HttpServletRequest servletRequest, String uri, String httpMethod) {
setServletRequestForJACC(servletRequest);
WebUserDataPermission dataPermission;
dataPermission = new WebUserDataPermission(uri, httpMethod == null ? null : new String[] { httpMethod }, requestIsSecure ? ... | conventional | public int hasUserDataPermission(HttpServletRequest<method*start>javax.servlet.http.HttpServletRequest<method*end> servletRequest, String<method*start>java.lang.String<method*end> uri, String<method*start>java.lang.String<method*end> httpMethod) {
setServletRequestForJACC<method*start>com.sun.enterprise.security.ja... |
public static List<method*start>java.util.List<method*end><String<method*start>java.lang.String<method*end>[]> getPermittedDepartmentPoints(Delegator<method*start>org.ofbiz.entity.Delegator<method*end> delegator, List<method*start>java.util.List<method*end><GenericValue<method*start>org.ofbiz.entity.GenericValue<method... | conventional | public static List<method*start>java.util.List<method*end><String<method*start>java.lang.String<method*end>[]> getPermittedDepartmentPoints(Delegator<method*start>org.ofbiz.entity.Delegator<method*end> delegator, List<method*start>java.util.List<method*end><GenericValue<method*start>org.ofbiz.entity.GenericValue<method... |
@Override
public String execute(DiscordBot bot, String[] args, MessageChannel channel, User author, Message inputMessage) {
Guild guild = ((TextChannel) channel).getGuild();
if (args.length == 0) {
return "show overview";
}
if (args[0].equalsIgnoreCase("create")) {
String argument =... | annotation | @Override
public String<method*start>java.lang.String<method*end> execute(DiscordBot<method*start>emily.main.DiscordBot<method*end> bot, String<method*start>java.lang.String<method*end>[] args, MessageChannel<method*start>net.dv8tion.jda.core.entities.MessageChannel<method*end> channel, User<method*start>net.dv8tion.jd... |
public javax.security.auth.Subject authenticate(final Object rawCredentials) {
final Object[] arr = (Object[]) rawCredentials;
if (arr[0] == null || arr[1] == null) {
throw new SecurityException("Invalid credentials");
}
final String username = arr[0].toString();
Credentials internalCred... | conventional | public Subject<method*start>javax.security.auth.Subject<method*end> authenticate(final Object<method*start>java.lang.Object<method*end> rawCredentials) {
// If not an array of object do not give any clues just throw exception
if (rawCredentials == null || !(rawCredentials instanceof Object<method*start>java.lan... |
protected boolean enableReplaceObject(boolean enable) throws SecurityException {
if (enable == enableReplace) {
return enable;
}
if (enable) {
enableReplace = enable;
return !enableReplace;
} | conventional | protected boolean enableReplaceObject(bo<method*start>java.lang.SecurityException<method*end>olean enable) throws SecurityException<method*start>java.io.ObjectOutputStream.enableReplace<method*end> {
if (enable == enableReplace) {
return enable;
}
if (enable) {
Security<method*start>java.lan... |
public void checkAwtEventQueueAccess() {
AppContext<method*start>sun.awt.AppContext<method*end> appContext = AppContext.getAppContext<method*start>sun.awt.AppContext.getAppContext<method*end>();
AppletClassLoader appletClassLoader = currentAppletClassLoader();
// If we're about to allow access to t... | conventional | public void checkAwtEventQueueAccess() {
AppContext<method*start>sun.awt.AppContext<method*end> appContext = AppContext.getAppContext<method*start>sun.awt.AppContext.getAppContext<method*end>();
AppletClassLoader appletClassLoader = currentAppletClassLoader();
if (AppContext.isMainContext<method*start>sun.a... |
public static void conservativeCheckMemberAccess(Member<method*start>java.lang.reflect.Member<method*end> m) throws SecurityException<method*start>java.lang.SecurityException<method*end> {
final
final Class<method*start>java.lang.Class<method*end><?> declaringClass = m.getDeclaringClass<method*start>java.lang.... | conventional | public static void conservativeCheckMemberAccess(Member<method*start>java.lang.reflect.Member<method*end> m) throws SecurityException<method*start>java.lang.SecurityException<method*end> {
final SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>java.lang.... |
@CallerSensitive<method*start>jdk.internal.reflect.CallerSensitive<method*end>
public final boolean trySetAccessible() {
if (override<method*start>java.lang.reflect.AccessibleObject.override<method*end> == true)
return true;
if (!Member<method*start>java.lang.reflect.Member<method*end>.class.... | annotation | @CallerSensitive<method*start>jdk.internal.reflect.CallerSensitive<method*end>
public final boolean trySetAccessible() {
AccessibleObject.checkPermission<method*start>java.lang.reflect.AccessibleObject.checkPermission<method*end>();
if (override<method*start>java.lang.reflect.AccessibleObject.override<method*en... |
@CallerSensitive<method*start>jdk.internal.reflect.CallerSensitive<method*end>
public final boolean trySetAccessible() {
// 如果已经覆盖(禁用)了安全检查,直接返回true
if (override) {
return true;
}
// if it's not a Constructor, Method, Field then no access check
if (!Member<method*start>java.lang.reflec... | conventional | @CallerSensitive<method*start>jdk.internal.reflect.CallerSensitive<method*end>
public final boolean trySetAccessible() {
AccessibleObject.checkPermission<method*start>java.lang.reflect.AccessibleObject.checkPermission<method*end>();
// 如果已经覆盖(禁用)了安全检查,直接返回true
if (override) {
return true;
}
... |
public String ac_add_access_$_2(Args args) throws Exception {
String acl = args.argv(0);
String princ = args.argv(1);
if (allowed) {
_aclDb.addAllowed(acl, princ);
} else {
_aclDb.addDenied(acl, princ);
}
return "";
} | conventional | public String<method*start>java.lang.String<method*end> ac_add_access_$_2(Args<method*start>org.dcache.util.Args<method*end> args) throws Exception<method*start>java.lang.Exception<method*end> {
boolean allowed = !args.hasOption<method*start>org.dcache.util.Args.hasOption<method*end>("denied");
String<method*st... |
public static void assertPrivateAccessAllowed() throws ReflectionException<method*start>net.sf.oval.exception.ReflectionException<method*end> {
final SecurityManager<method*start>java.lang.SecurityManager<method*end> manager = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();... | conventional | public static void assertPrivateAccessAllowed() throws ReflectionException<method*start>net.sf.oval.exception.ReflectionException<method*end> {
final SecurityManager<method*start>java.lang.SecurityManager<method*end> manager = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();... |
public static <S> List<S> getProviders(Class<method*start>java.lang.Class<method*end><S> service) {
List<S> providers = new ArrayList<method*start>java.util.ArrayList<method*end><>();
for (JVMCIServiceLocator access : getJVMCIServiceLocators()) {
S provider = access.getProvider<method*start>jdk.vm.... | conventional | public static <S> List<S> getProviders(Class<method*start>java.lang.Class<method*end><S> service) {
Services.checkJVMCIEnabled<method*start>jdk.vm.ci.services.Services.checkJVMCIEnabled<method*end>();
SecurityManager<method*start>java.lang.SecurityManager<method*end> sm = System.getSecurityManager<method*start>... |
private static void checkLoggingAccess() {
boolean checked = false;
final Logger<method*start>java.util.logging.Logger<method*end> global = Logger.getLogger<method*start>java.util.logging.Logger.getLogger<method*end>("global");
try {
if (Logger<method*start>java.util.logging.Logger<method*end>.clas... | conventional | private static void checkLoggingAccess() {
/**
* Some environments selectively enforce logging permissions by allowing
* access to loggers but not allowing access to handlers. This is an
* indirect way of checking for LoggingPermission when the LogManager is
* not present. The root logger will l... |
public static String clearProperty(String prop) {
// $NON-NLS-1$
if (!propertiesInitialized)
throw new Error("bootstrap error, system property access before init: " + prop);
if (prop.length() == 0)
throw new IllegalArgumentException();
return (String) systemProperties.remove(prop);
} | annotation | public static Stri<method*start>java.lang.String<method*end>ng clearProperty(String prop) {
// $NON-NLS-1$
if (!propertiesInitialized)
throw new Error("bootstrap error, system property access before init: " + prop);
if (prop.length() == 0)
throw new IllegalArgumentException();
SecurityMa... |
@Override
public CmsFile<method*start>org.opencms.file.CmsFile<method*end> writeFile(CmsObject<method*start>org.opencms.file.CmsObject<method*end> cms, CmsSecurityManager<method*start>org.opencms.db.CmsSecurityManager<method*end> securityManager, CmsFile<method*start>org.opencms.file.CmsFile<method*end> resource) throw... | annotation | @Override
public CmsFile<method*start>org.opencms.file.CmsFile<method*end> writeFile(CmsObject<method*start>org.opencms.file.CmsObject<method*end> cms, CmsSecurityManager<method*start>org.opencms.db.CmsSecurityManager<method*end> securityManager, CmsFile<method*start>org.opencms.file.CmsFile<method*end> resource) throw... |
public static InvocationHandler<method*start>java.lang.reflect.InvocationHandler<method*end> create(final Object<method*start>java.lang.Object<method*end> delegate) {
return new InvocationHandler<method*start>java.lang.reflect.InvocationHandler<method*end>() {
public Object<method*start>java.lang.Obje... | conventional | public static InvocationHandler<method*start>java.lang.reflect.InvocationHandler<method*end> create(final Object<method*start>java.lang.Object<method*end> delegate) {
SecurityManager<method*start>java.lang.SecurityManager<method*end> s = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<met... |
@Override
public boolean handlePropInfo(@NotNull<method*start>org.jetbrains.annotations.NotNull<method*end> Tree parent, @NotNull<method*start>org.jetbrains.annotations.NotNull<method*end> PropInfo protectedPropInfo, @NotNull<method*start>org.jetbrains.annotations.NotNull<method*end> PropertyDefinition def) throws Repo... | annotation | @Override<method*start>java.lang.Override<method*end>
public boolean handlePropInfo(@NotNull<method*start>org.jetbrains.annotations.NotNull<method*end> Tree parent, @NotNull<method*start>org.jetbrains.annotations.NotNull<method*end> PropInfo protectedPropInfo, @NotNull<method*start>org.jetbrains.annotations.NotNull<met... |
public void checkMemberAccess(Class<method*start>java.lang.Class<method*end><?> clazz, int which) {
if (clazz == null) {
throw new NullPointerException<method*start>java.lang.NullPointerException<method*end>("class can't be null");
}
if (which != Member.PUBLIC<method*start>java.lang.reflect.Member.P... | conventional | public void checkMemberAccess(Class<method*start>java.lang.Class<method*end><?> clazz, int which) {
if (clazz == null) {
throw new NullPointerException<method*start>java.lang.NullPointerException<method*end>("class can't be null");
}
if (which != Member.PUBLIC<method*start>java.lang.reflect.Member.P... |
@Override
public final int doWikiStartTag() {
for (final String<method*start>java.lang.String<method*end> perm : m_permissionList) {
final boolean hasPermission;
hasPermission = !checkPermission(perm.substring<method*start>java.lang.String.substring<method*end>(1));
}
... | annotation | @Override<method*start>java.lang.Override<method*end>
public final int doWikiStartTag() {
for (final String<method*start>java.lang.String<method*end> perm : m_permissionList) {
final boolean hasPermission;
if (perm.charAt<method*start>java.lang.String.charAt<method*end>(0) == '!') {
hasP... |
private static boolean hasCachePermission() {
return hasPermission.booleanValue();
} else {
try {
if (security != null) {
if (cachedir != null) {
cachepath = cachedir.getPath();
} else {
... | conventional | private static boolean hasCachePermission() {
Boolean<method*start>java.lang.Boolean<method*end> hasPermission = getCacheInfo().getHasPermission<method*start>javax.imageio.ImageIO.CacheInfo.getHasPermission<method*end>();
if (hasPermission != null) {
return hasPermission.booleanValue<method*start>java.l... |
public Object<method*start>java.lang.Object<method*end> hasPermission(ProceedingJoinPoint<method*start>org.aspectj.lang.ProceedingJoinPoint<method*end> proceedingJoinPoint) {
MethodSignature<method*start>org.aspectj.lang.reflect.MethodSignature<method*end> methodSignature = (MethodSignature<method*start>org.aspectj... | conventional | public Object<method*start>java.lang.Object<method*end> hasPermission(ProceedingJoinPoint<method*start>org.aspectj.lang.ProceedingJoinPoint<method*end> proceedingJoinPoint) {
MethodSignature<method*start>org.aspectj.lang.reflect.MethodSignature<method*end> methodSignature = (MethodSignature<method*start>org.aspectj... |
@Nonnull<method*start>javax.annotation.Nonnull<method*end>
@Override<method*start>java.lang.Override<method*end>
public MessageAction editMessageById(@Nonnull<method*start>javax.annotation.Nonnull<method*end> String<method*start>java.lang.String<method*end> id, @Nonnull<method*start>javax.annotation.Nonnull<method*end>... | annotation | @Nonnull<method*start>javax.annotation.Nonnull<method*end>
@Override<method*start>java.lang.Override<method*end>
public MessageAction editMessageById(@Nonnull<method*start>javax.annotation.Nonnull<method*end> String<method*start>java.lang.String<method*end> id, @Nonnull<method*start>javax.annotation.Nonnull<method*en... |
public boolean includeDefinition(ViewEntity<method*start>org.apache.ambari.server.orm.entities.ViewEntity<method*end> definitionEntity) {
for (ViewInstanceEntity<method*start>org.apache.ambari.server.orm.entities.ViewInstanceEntity<method*end> instanceEntity : definitionEntity.getInstances<method*start>org.apa... | conventional | public boolean includeDefinition(ViewEntity<method*start>org.apache.ambari.server.orm.entities.ViewEntity<method*end> definitionEntity) {
if (checkPermission<method*start>org.apache.ambari.server.view.ViewRegistry.checkPermission<method*end>(null, false)) {
return true;
}
for (ViewInstanceEntity... |
public void registration(MBeanMetaData metadata, int operation) throws MBeanRegistrationException<method*start>javax.management.MBeanRegistrationException<method*end> {
switch(operation) {
case PRE_REGISTER:
break;
case POST_REGISTER_TRUE:
// The MBe... | conventional | public void registration(MBeanMetaData<method*start>org.apache.felix.mosgi.jmx.agent.mx4j.server.MBeanMetaData<method*end> metadata, int operation) throws MBeanRegistrationException<method*start>javax.management.MBeanRegistrationException<method*end> {
switch(operation) {
case PRE_REGISTER:
c... |
public void checkConnect(String host, int port) {
if (host == null) {
throw new NullPointerException("host can't be null");
}
if (!host.startsWith("[") && host.indexOf(':') != -1) {
host = "[" + host + "]";
}
} | conventional | public void checkConnect(String<method*start>java.lang.String<method*end> host, int port) {
if (host == null) {
throw new NullPointerException<method*start>java.lang.NullPointerException<method*end>("host can't be null");
}
if (!host.startsWith<method*start>dispatch.host.startsWith<method*end>("... |
public void addPropertyChangeListener(PropertyChangeListener l) {
/* J2ObjC removed.
if (l == null) {
throw new NullPointerException();
}
changes.addPropertyChangeListener(l);
*/
throw new UnsupportedOperationException();
}
| conventional | public void addPropertyChangeListener(PropertyChangeListener l) {
/* J2ObjC removed.
if (l == null) {
throw new NullPointerException();
}
checkPermission();
changes.addPropertyChangeListener(l);
*/
throw new UnsupportedOperationException();
}
|
public void delete() {
Object<method*start>java.lang.Object<method*end> sm = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
(Permissions.ALL_PERMISSION<method*start>org.apache.felix.framework.security.util.Permissions.ALL_PERMISSION<method*end>);
synchronized (m_l... | conventional | public void delete() {
Object<method*start>java.lang.Object<method*end> sm = System.getSecurityManager<method*start>java.lang.System.getSecurityManager<method*end>();
if (sm != null) {
((SecurityManager<method*start>java.lang.SecurityManager<method*end>) sm).checkPermission<method*start>java.lang.Sec... |
public void checkAccess(Thread t) {
if (t == null) {
throw new NullPointerException("thread can't be null");
}
} | conventional | public void checkAccess(Thread<method*start>java.lang.Thread<method*end> t) {
if (t == null) {
throw new NullPointerException<method*start>java.lang.NullPointerException<method*end>("thread can't be null");
}
if (t.getThreadGroup<method*start>java.lang.Thread.getThreadGroup<method*end>() == root... |
public boolean checkTopLevelWindow(Object window) {
if (window == null)
throw new NullPointerException();
return true;
} catch (SecurityException e) {
return false;
}
} | conventional | public boolean checkTopLevelWindow(Object<method*start>java.lang.Object<method*end> window) {
if (window == null)
throw new NullPointerException<method*start>java.lang.NullPointerException<method*end>();
try {
checkPermission<method*start>java.lang.SecurityManager.checkPermission<method*end>... |
@Override
public void checkPropertyAccess(String key) {
if (blockedPropertyKeys.contains(key)) {
try {
} catch (SecurityException e) {
throw new SecurityException("ODPS-0730001: " + e.getMessage());
}
}
}
| conventional | @Override<method*start>java.lang.Override<method*end>
public void checkPropertyAccess(String<method*start>java.lang.String<method*end> key) {
super.checkPropertyAccess<method*start>java.lang.SecurityManager.checkPropertyAccess<method*end>(key);
if (blockedPropertyKeys.contains<method*start>java.util.List.con... |
public boolean checkTopLevelWindow(Object<method*start>java.lang.Object<method*end> window) {
if (window == null)
throw new NullPointerException<method*start>java.lang.NullPointerException<method*end>();
return true;
} | conventional | public boolean checkTopLevelWindow(Object<method*start>java.lang.Object<method*end> window) {
if (window == null)
throw new NullPointerException<method*start>java.lang.NullPointerException<method*end>();
/* try
{
checkPermission(new AWTPermission("showWindowWithoutWarningBanner"));
retur... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.