/* Sample .java.policy settings for the Hades applet. */ /* the following entries grant a few rights to applets loaded from the */ /* specified webserver and URL. The PropertyPermission allows reading */ /* the system properties including "user.home" to locate the user's home */ /* directory. When uncommented, the SocketPermissions allow the applets */ /* to open network connections to other servers besides the applet */ /* webserver. */ /* The FilePermissions are used to grant access to the user configuration */ /* files, as well as logging and reading and writing design files at the */ /* specified directories, here ~/.hades/ and /tmp/hades. */ /* */ /* The AudioPermission is required for the FreeTTS text-to-speech demos, */ /* while the several RuntimePermissions are required for both FreeTTS and */ /* Jython scripting, due to the way those tools are implemented. */ grant codeBase "http://tams-www.informatik.uni-hamburg.de/applets/hades/-" { permission java.util.PropertyPermission "*", "read,write"; permission java.io.FilePermission "${user.home}${/}.hadesrc", "read"; permission java.io.FilePermission "${user.home}${/}.hades", "read, write"; permission java.io.FilePermission "/tmp/hades", "read, write, delete"; permission javax.sound.sampled.AudioPermission "play"; permission java.lang.RuntimePermission "createClassLoader"; permission java.lang.RuntimePermission "getClassLoader"; permission java.lang.RuntimePermission "getProtectionDomain"; /* permission java.io.FilePermission "<>", "read, write, delete, execute"; */ /* permission java.net.SocketPermission "*", "connect,accept,listen,resolve";*/ }; /* uncomment the following to grant all rights to all applets... */ /* very dangerous, but sometimes useful during debugging */ /* grant { */ /* permission java.security.AllPermission; */ /*}; */