rmid starts the activation system daemon that allows objects to be registered and activated in a Java virtual machine (JVM).
rmid [options]
The rmid tool starts the activation system daemon. The activation system daemon must be started before activatable objects can be either registered with the activation system or activated in a JVM. See the RMI Specification and Activation tutorials for details on how to write programs that use activatable remote objects.The daemon can be started by executing the
rmid
command, and specifying a security policy file, as follows:rmid -J-Djava.security.policy=rmid.policyNote: When running Sun's implementation of
rmid
, by default you will need to specify a security policy file so thatrmid
can verify whether or not the information in eachActivationGroupDesc
is allowed to be used to launch a JVM for an activation group. Specifically, the command and options specified by theCommandEnvironment
and anyProperties
passed to anActivationGroupDesc
's constructor must now be explicitly allowed in the security policy file forrmid
. The value of thesun.rmi.activation.execPolicy
property dictates the policy thatrmid
uses to determine whether or not the information in anActivationGroupDesc
may be used to launch a JVM for an activation group.Executing
rmid
by defaultTo specify an alternate port for the registry, you must specify the
- starts the Activator and an internal registry on the default port, 1098, and
- binds an
ActivationSystem
to the namejava.rmi.activation.ActivationSystem
in this internal registry.-port
option when starting uprmid
. For example,rmid -J-Djava.security.policy=rmid.policy -port 1099starts the activation system daemon and a registry on the registry's default port, 1099.
- -C<someCommandLineOption>
- Specifies an option that is passed as a command-line argument to each child process (activation group) of
rmid
when that process is created. For example, you could pass a property to each Java virtual machine spawned by the activation system daemon:rmid -C-Dsome.property=valueThis ability to pass command-line arguments to child processes can be useful for debugging. For example, the following command:rmid -C-Djava.rmi.server.logCalls=truewill enable server-call logging in all child JVMs.- -J<someCommandLineOption>
- Specifies an option that is passed to the
java
interpreter runningrmid
. For example, to specify thatrmid
use a policy file namedrmid.policy
, the-J
option can be used to define thejava.security.policy
property onrmid
's command line, for example:rmid -J-Djava.security.policy=rmid.policy- -J-Dsun.rmi.activation.execPolicy=<policy>
- Specifies the policy that
rmid
employs to check commands and command-line options used to launch the JVM in which an activation group runs. Please note that this option exists only in Sun's implementation of the RMI activation daemon. If this property is not specified on the command line, the result is the same as if-J-Dsun.rmi.activation.execPolicy=default
were specified. The possible values of <policy> can bedefault
, <policyClassName>, ornone
:
- default (or if this property is unspecified)
The default
execPolicy
allowsrmid
to execute commands with specific command-line options only ifrmid
has been granted permission to execute those commands and options in the security policy file thatrmid
uses. Only the default activation group implementation can be used with the default execution policy.
rmid
launches a JVM for an activation group using the information in the group's registered activation group descriptor, anActivationGroupDesc
. The group descriptor specifies an optionalActivationGroupDesc.CommandEnvironment
which includes the command to execute to start the activation group as well as any command line options to be added to the command line. By default,rmid
uses thejava
command found injava.home
. The group descriptor also contains properties overrides that are added to the command line as options defined as:-D<property>=<value>The permission
com.sun.rmi.rmid.ExecPermission
is used to grantrmid
permission to execute a command, specified in the group descriptor'sCommandEnvironment
to launch an activation group. The permissioncom.sun.rmi.rmid.ExecOptionPermission
is used to allowrmid
to use command-line options, specified as properties overrides in the group descriptor or as options in theCommandEnvironment
, when launching the activation group.When granting
rmid
permission to execute various commands and options, the permissionsExecPermission
andExecOptionPermission
need to be granted universally (i.e., granted to all code sources).
ExecPermission
- The
ExecPermission
class represents permission forrmid
to execute a specific command to launch an activation group.Syntax
The name of anExecPermission
is the path name of a command to grantrmid
permission to execute. A path name that ends in "/*" indicates all the files contained in that directory (where "/" is the file-separator character,File.separatorChar
). A path name that ends with "/-" indicates all files and subdirectories contained in that directory (recursively). A path name consisting of the special token "<<ALL FILES>>" matches any file.Note: A path name consisting of a single "*" indicates all the files in the current directory, while a path name consisting of a single "-" indicates all the files in the current directory and (recursively) all files and subdirectories contained in the current directory.
ExecOptionPermission
- The
ExecOptionPermission
class represents permission forrmid
to use a specific command-line option when launching an activation group. The name of anExecOptionPermission
is the value of a command line option.Syntax
Options support a limited wildcard scheme. An asterisk signifies a wildcard match, and it may appear as the option name itself (i.e., it matches any option), or an asterisk may appear at the end of the option name only if the asterisk follows either a "." or "=".For example: "*" or "-Dfoo.*" or "-Da.b.c=*" is valid, "*foo" or "-Da*b" or "ab*" is not.
- Policy file for
rmid
- When granting
rmid
permission to execute various commands and options, the permissionsExecPermission
andExecOptionPermission
need to be granted universally (i.e., granted to all code sources). It is safe to grant these permissions universally because onlyrmid
checks these permissions.An example policy file that grants various execute permissions to
rmid
is:grant { permission com.sun.rmi.rmid.ExecPermission "/files/apps/java/jdk1.2.2/solaris/bin/java"; permission com.sun.rmi.rmid.ExecPermission "/files/apps/java/jdk1.2.2/solaris/bin/java_g"; permission com.sun.rmi.rmid.ExecPermission "/files/apps/rmidcmds/*"; permission com.sun.rmi.rmid.ExecOptionPermission "-Djava.security.policy=/files/policies/group.policy"; permission com.sun.rmi.rmid.ExecOptionPermission "-Djava.security.debug=*"; permission com.sun.rmi.rmid.ExecOptionPermission "-Dsun.rmi.*"; };The first two permissions granted allowrmid
to execute the 1.2.2 version of thejava
andjava_g
commands, specified by their explicit path names. Note that by default, the version of thejava
command found injava.home
is used (the same one thatrmid
uses), and does not need to be specified in the policy file. The third permission allowsrmid
to execute any command in the directory/files/apps/rmidcmds
.The fourth permission granted, an
ExecOptionPermission
, allowsrmid
to launch an activation group that defines the security policy file to be/files/policies/group.policy
. The next permission allows thejava.security.debug
property to be used by an activation group. The last permission allows any property in thesun.rmi
property name hierarchy to be used by activation groups.To start
rmid
with a policy file, thejava.security.policy
property needs to be specified onrmid
's command line, for example:rmid -J-Djava.security.policy=rmid.policy
- <policyClassName>
If the default behavior is not flexible enough, an administrator can provide, when starting
rmid
, the name of a class whosecheckExecCommand
method is executed in order to check commands to be executed by rmid.The policyClassName specifies a public class with a public, no-argument constructor and an implementation of the following
checkExecCommand
method:public void checkExecCommand(ActivationGroupDesc desc, String[] command) throws SecurityException;Before launching an activation group,rmid
calls the policy'scheckExecCommand
method, passing it the activation group descriptor and an array containing the complete command to launch the activation group. If thecheckExecCommand
throws aSecurityException
,rmid
will not launch the activation group and anActivationException
will be thrown to the caller attempting to activate the object.
- CLASSPATH
- Used to provide the system a path to user-defined classes. Directories are separated by colons. For example:
.:/usr/local/java/classes
rmic, CLASSPATH, java
Copyright © 2002 Sun Microsystems, Inc. All Rights Reserved. |
Java Software |