X-Git-Url: http://git.argeo.org/?a=blobdiff_plain;f=security%2Fruntime%2Forg.argeo.security.core%2Fsrc%2Fmain%2Fjava%2Forg%2Fargeo%2Fsecurity%2FSystemExecutionService.java;h=075a6c3d80e73eebc5ac4d47b2fe375ae6da0542;hb=3ea877ebf1b76ffd20319f45b535da45b38e2439;hp=e03f27ab2461455cb7abff01f0b64ae978a95a32;hpb=6b3ffc999e1ba5719420b861c7fe411bbbdfa9e2;p=lgpl%2Fargeo-commons.git diff --git a/security/runtime/org.argeo.security.core/src/main/java/org/argeo/security/SystemExecutionService.java b/security/runtime/org.argeo.security.core/src/main/java/org/argeo/security/SystemExecutionService.java index e03f27ab2..075a6c3d8 100644 --- a/security/runtime/org.argeo.security.core/src/main/java/org/argeo/security/SystemExecutionService.java +++ b/security/runtime/org.argeo.security.core/src/main/java/org/argeo/security/SystemExecutionService.java @@ -1,3 +1,18 @@ +/* + * Copyright (C) 2007-2012 Argeo GmbH + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ package org.argeo.security; import java.util.concurrent.Callable; @@ -6,22 +21,22 @@ import java.util.concurrent.Future; /** * Allows to execute code authenticated as a system user (that is not a real - * person). The {@link Executor} interface interface is not used directly in - * order to allow future extension of this interface and to simplify its - * publication (e.g. as an OSGi service) and interception. + * person). The {@link Executor} interface is not used directly in order to + * allow future extension of this interface and to simplify its publication + * (e.g. as an OSGi service) and interception. */ public interface SystemExecutionService extends Executor { /** * Executes this {@link Runnable} within a system authenticated context. * Implementations should make sure that this method is properly secured via - * Java permissions since it could access to everything without credentials. + * Java permissions since it could access everything without credentials. */ public void execute(Runnable runnable); - + /** * Executes this {@link Callable} within a system authenticated context. * Implementations should make sure that this method is properly secured via - * Java permissions since it could access to everything without credentials. + * Java permissions since it could access everything without credentials. */ public Future submit(Callable task); }