Skip to content

Commit c6a61fc

Browse files
committed
Move to secure_sm package
Signed-off-by: Craig Perkins <[email protected]>
1 parent 8950858 commit c6a61fc

File tree

5 files changed

+10
-10
lines changed

5 files changed

+10
-10
lines changed

libs/agent-sm/agent-policy/src/main/java/org/opensearch/security/AccessController.java renamed to libs/agent-sm/agent-policy/src/main/java/org/opensearch/secure_sm/AccessController.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
* compatible open source license.
77
*/
88

9-
package org.opensearch.security;
9+
package org.opensearch.secure_sm;
1010

1111
import java.util.concurrent.Callable;
1212
import java.util.function.Supplier;

libs/agent-sm/agent-policy/src/main/java/org/opensearch/security/package-info.java renamed to libs/agent-sm/agent-policy/src/main/java/org/opensearch/secure_sm/package-info.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,4 @@
99
/**
1010
* Classes for running code in a privileged context
1111
*/
12-
package org.opensearch.security;
12+
package org.opensearch.secure_sm;

libs/agent-sm/agent/src/main/java/org/opensearch/javaagent/StackCallerProtectionDomainChainExtractor.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ public final class StackCallerProtectionDomainChainExtractor implements Function
3232
*/
3333
private static final Set<String> ACCESS_CONTROLLER_CLASSES = Set.of(
3434
"java.security.AccessController",
35-
"org.opensearch.security.AccessController"
35+
"org.opensearch.secure_sm.AccessController"
3636
);
3737

3838
private static final Set<String> DO_PRIVILEGED_METHODS = Set.of("doPrivileged", "doPrivilegedChecked");

libs/agent-sm/agent/src/test/java/org/opensearch/javaagent/StackCallerProtectionDomainExtractorTests.java

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ public Void run() {
120120

121121
@Test
122122
public void testStackTruncationWithOpenSearchAccessController() {
123-
org.opensearch.security.AccessController.doPrivileged(() -> {
123+
org.opensearch.secure_sm.AccessController.doPrivileged(() -> {
124124
StackCallerProtectionDomainChainExtractor extractor = StackCallerProtectionDomainChainExtractor.INSTANCE;
125125
Set<ProtectionDomain> protectionDomains = (Set<ProtectionDomain>) extractor.apply(captureStackFrames().stream());
126126
assertEquals(1, protectionDomains.size());
@@ -151,7 +151,7 @@ public void testStackTruncationWithOpenSearchAccessController() {
151151

152152
@Test
153153
public void testStackTruncationWithOpenSearchAccessControllerUsingSupplier() {
154-
org.opensearch.security.AccessController.doPrivileged((Supplier<Void>) () -> {
154+
org.opensearch.secure_sm.AccessController.doPrivileged((Supplier<Void>) () -> {
155155
StackCallerProtectionDomainChainExtractor extractor = StackCallerProtectionDomainChainExtractor.INSTANCE;
156156
Set<ProtectionDomain> protectionDomains = (Set<ProtectionDomain>) extractor.apply(captureStackFrames().stream());
157157
assertEquals(1, protectionDomains.size());
@@ -183,7 +183,7 @@ public void testStackTruncationWithOpenSearchAccessControllerUsingSupplier() {
183183

184184
@Test
185185
public void testStackTruncationWithOpenSearchAccessControllerUsingCallable() throws Exception {
186-
org.opensearch.security.AccessController.doPrivilegedChecked(() -> {
186+
org.opensearch.secure_sm.AccessController.doPrivilegedChecked(() -> {
187187
StackCallerProtectionDomainChainExtractor extractor = StackCallerProtectionDomainChainExtractor.INSTANCE;
188188
Set<ProtectionDomain> protectionDomains = (Set<ProtectionDomain>) extractor.apply(captureStackFrames().stream());
189189
assertEquals(1, protectionDomains.size());
@@ -216,13 +216,13 @@ public void testStackTruncationWithOpenSearchAccessControllerUsingCallable() thr
216216
@Test
217217
public void testAccessControllerUsingCallableThrowsException() {
218218
assertThrows(IllegalArgumentException.class, () -> {
219-
org.opensearch.security.AccessController.doPrivilegedChecked(() -> { throw new IllegalArgumentException("Test exception"); });
219+
org.opensearch.secure_sm.AccessController.doPrivilegedChecked(() -> { throw new IllegalArgumentException("Test exception"); });
220220
});
221221
}
222222

223223
@Test
224224
public void testStackTruncationWithOpenSearchAccessControllerUsingCheckedRunnable() throws IllegalArgumentException {
225-
org.opensearch.security.AccessController.doPrivilegedChecked(() -> {
225+
org.opensearch.secure_sm.AccessController.doPrivilegedChecked(() -> {
226226
StackCallerProtectionDomainChainExtractor extractor = StackCallerProtectionDomainChainExtractor.INSTANCE;
227227
Set<ProtectionDomain> protectionDomains = (Set<ProtectionDomain>) extractor.apply(captureStackFrames().stream());
228228
assertEquals(1, protectionDomains.size());
@@ -254,7 +254,7 @@ public void testStackTruncationWithOpenSearchAccessControllerUsingCheckedRunnabl
254254
@Test
255255
public void testAccessControllerUsingCheckedRunnableThrowsException() {
256256
assertThrows(IllegalArgumentException.class, () -> {
257-
org.opensearch.security.AccessController.doPrivilegedChecked(() -> { throw new IllegalArgumentException("Test exception"); });
257+
org.opensearch.secure_sm.AccessController.doPrivilegedChecked(() -> { throw new IllegalArgumentException("Test exception"); });
258258
});
259259
}
260260
}

modules/ingest-geoip/src/main/java/org/opensearch/ingest/geoip/GeoIpProcessor.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@
5151
import org.opensearch.ingest.IngestDocument;
5252
import org.opensearch.ingest.Processor;
5353
import org.opensearch.ingest.geoip.IngestGeoIpModulePlugin.GeoIpCache;
54-
import org.opensearch.security.AccessController;
54+
import org.opensearch.secure_sm.AccessController;
5555

5656
import java.io.IOException;
5757
import java.net.InetAddress;

0 commit comments

Comments
 (0)