X-Git-Url: http://git.argeo.org/?a=blobdiff_plain;f=security%2Fruntime%2Forg.argeo.security.core%2Fsrc%2Fmain%2Fjava%2Forg%2Fargeo%2Fsecurity%2FSystemExecutionService.java;h=075a6c3d80e73eebc5ac4d47b2fe375ae6da0542;hb=4c1cdecd3d3de9ff6a70b875a72bfd29a85b0227;hp=b67eb27b1446bad9275e11b2ff103f555c518052;hpb=44f3f677b3b9083bc38ad14a822c05200cc6c7b1;p=lgpl%2Fargeo-commons.git diff --git a/security/runtime/org.argeo.security.core/src/main/java/org/argeo/security/SystemExecutionService.java b/security/runtime/org.argeo.security.core/src/main/java/org/argeo/security/SystemExecutionService.java index b67eb27b1..075a6c3d8 100644 --- a/security/runtime/org.argeo.security.core/src/main/java/org/argeo/security/SystemExecutionService.java +++ b/security/runtime/org.argeo.security.core/src/main/java/org/argeo/security/SystemExecutionService.java @@ -1,18 +1,42 @@ +/* + * Copyright (C) 2007-2012 Argeo GmbH + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ package org.argeo.security; +import java.util.concurrent.Callable; import java.util.concurrent.Executor; +import java.util.concurrent.Future; /** * Allows to execute code authenticated as a system user (that is not a real - * person). The {@link Executor} interface interface is not used directly in - * order to allow future extension of this interface and to simplify its - * publication (e.g. as an OSGi service) and interception. + * person). The {@link Executor} interface is not used directly in order to + * allow future extension of this interface and to simplify its publication + * (e.g. as an OSGi service) and interception. */ public interface SystemExecutionService extends Executor { /** - * Executes this Runnable within a system authenticated context. + * Executes this {@link Runnable} within a system authenticated context. * Implementations should make sure that this method is properly secured via - * Java permissions since it could access to everything without credentials. + * Java permissions since it could access everything without credentials. */ public void execute(Runnable runnable); + + /** + * Executes this {@link Callable} within a system authenticated context. + * Implementations should make sure that this method is properly secured via + * Java permissions since it could access everything without credentials. + */ + public Future submit(Callable task); }