You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@xalan.apache.org by "Brian Minchau (JIRA)" <xa...@xml.apache.org> on 2005/03/01 20:59:50 UTC

[jira] Updated: (XALANJ-2068) Xalan is too strict for codes running in a sandbox

     [ http://issues.apache.org/jira/browse/XALANJ-2068?page=history ]

Brian Minchau updated XALANJ-2068:
----------------------------------

        reviewer: minchau@ca.ibm.com
    fix-priority: fp3

Update the issue to have Brian Minchau as the reviewer, once there is a patch.

> Xalan is too strict for codes running in a sandbox
> --------------------------------------------------
>
>          Key: XALANJ-2068
>          URL: http://issues.apache.org/jira/browse/XALANJ-2068
>      Project: XalanJ2
>         Type: Bug
>   Components: Serialization
>     Versions: CurrentCVS
>     Reporter: Christine Li
>     Assignee: Christine Li
>     Priority: Minor

>
> The original problem was reported by customer from Sun. "some people updated that variable in their code in order to run Xalan in a sandbox. Now that the variable cannot be updated, running Xalan in an unsigned applet is not possible anymore." Xalan should support the code that attempts to get the resource in a privileged block in order sidestep the problem.

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
   http://issues.apache.org/jira/secure/Administrators.jspa
-
If you want more information on JIRA, or have a bug to report see:
   http://www.atlassian.com/software/jira


---------------------------------------------------------------------
To unsubscribe, e-mail: xalan-dev-unsubscribe@xml.apache.org
For additional commands, e-mail: xalan-dev-help@xml.apache.org