insure that classes are loaded by trusted code in a sandbox
authorbillbarker <billbarker@13f79535-47bb-0310-9956-ffa450edef68>
Wed, 24 Dec 2008 03:30:40 +0000 (03:30 +0000)
committerbillbarker <billbarker@13f79535-47bb-0310-9956-ffa450edef68>
Wed, 24 Dec 2008 03:30:40 +0000 (03:30 +0000)
git-svn-id: https://svn.apache.org/repos/asf/tomcat/trunk@729206 13f79535-47bb-0310-9956-ffa450edef68

java/org/apache/coyote/http11/Http11Processor.java

index 812eef7..7a0a3dd 100644 (file)
@@ -73,6 +73,8 @@ public class Http11Processor implements ActionHook {
     protected static StringManager sm =
         StringManager.getManager(Constants.Package);
 
+    protected static boolean isSecurityEnabled = 
+        org.apache.coyote.Constants.IS_SECURITY_ENABLED;
 
     // ------------------------------------------------------------ Constructor
 
@@ -1544,7 +1546,7 @@ public class Http11Processor implements ActionHook {
 
         // Add date header
         String date = null;
-        if (org.apache.coyote.Constants.IS_SECURITY_ENABLED){
+        if (isSecurityEnabled){
             date = AccessController.doPrivileged(
                     new PrivilegedAction<String>() {
                         public String run(){