Blame SOURCES/tomcat-9.0-catalina-policy.patch

d625b1
--- conf/catalina.policy.orig	2018-06-21 13:30:04.074492012 -0400
d625b1
+++ conf/catalina.policy	2018-06-21 13:30:02.111479809 -0400
d625b1
@@ -50,6 +50,30 @@ grant codeBase "file:${java.home}/lib/ex
d625b1
         permission java.security.AllPermission;
d625b1
 };
d625b1
 
d625b1
+// ========== RHEL SPECIFIC CODE PERMISSIONS =======================================
d625b1
+
d625b1
+// Allowing everything in /usr/share/java allows too many unknowns to be permitted
d625b1
+// Specifying the individual jars that tomcat needs to function with the security manager
d625b1
+// is the safest way forward.
d625b1
+grant codeBase "file:/usr/share/java/tomcat-servlet-4.0-api.jar" {
d625b1
+        permission java.security.AllPermission;
d625b1
+};
d625b1
+grant codeBase "file:/usr/share/java/tomcat-jsp-2.3-api.jar" {
d625b1
+        permission java.security.AllPermission;
d625b1
+};
d625b1
+grant codeBase "file:/usr/share/java/tomcat-el-3.0-api.jar" {
d625b1
+        permission java.security.AllPermission;
d625b1
+};
d625b1
+grant codeBase "file:/usr/share/java/ant.jar" {
d625b1
+        permission java.security.AllPermission;
d625b1
+};
d625b1
+grant codeBase "file:/usr/share/java/ant-launcher.jar" {
d625b1
+        permission java.security.AllPermission;
d625b1
+};
d625b1
+grant codeBase "file:/usr/lib/jvm/java/lib/tools.jar" {
d625b1
+        permission java.security.AllPermission;
d625b1
+};
d625b1
+
d625b1
 
d625b1
 // ========== CATALINA CODE PERMISSIONS =======================================
d625b1