Warning: file_get_contents(/data/phpspider/zhask/data//catemap/9/java/344.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
JavaDB显示错误并且不显示';开始_Java_Netbeans_Javadb - Fatal编程技术网

JavaDB显示错误并且不显示';开始

JavaDB显示错误并且不显示';开始,java,netbeans,javadb,Java,Netbeans,Javadb,在Google和StackOverflow上花了几个小时之后,我想问你一个关于这个错误的问题: Fri Jan 17 10:54:17 IST 2014 : Security manager installed using the Basic server security policy. Fri Jan 17 10:54:17 IST 2014 : access denied ("java.net.SocketPermission" "localhost:1527" "listen,resol

在Google和StackOverflow上花了几个小时之后,我想问你一个关于这个错误的问题:

Fri Jan 17 10:54:17 IST 2014 : Security manager installed using the Basic server security policy.
Fri Jan 17 10:54:17 IST 2014 : access denied ("java.net.SocketPermission" "localhost:1527" "listen,resolve")
java.security.AccessControlException: access denied ("java.net.SocketPermission" "localhost:1527" "listen,resolve")
    at java.security.AccessControlContext.checkPermission(AccessControlContext.java:372)
    at java.security.AccessController.checkPermission(AccessController.java:559)
    at java.lang.SecurityManager.checkPermission(SecurityManager.java:549)
    at java.lang.SecurityManager.checkListen(SecurityManager.java:1134)
    at java.net.ServerSocket.bind(ServerSocket.java:375)
    at java.net.ServerSocket.<init>(ServerSocket.java:237)
    at javax.net.DefaultServerSocketFactory.createServerSocket(ServerSocketFactory.java:231)
    at org.apache.derby.impl.drda.NetworkServerControlImpl.createServerSocket(Unknown Source)
    at org.apache.derby.impl.drda.NetworkServerControlImpl.access$000(Unknown Source)
    at org.apache.derby.impl.drda.NetworkServerControlImpl$1.run(Unknown Source)
    at java.security.AccessController.doPrivileged(Native Method)
    at org.apache.derby.impl.drda.NetworkServerControlImpl.blockingStart(Unknown Source)
    at org.apache.derby.impl.drda.NetworkServerControlImpl.executeWork(Unknown Source)
    at org.apache.derby.drda.NetworkServerControl.main(Unknown Source)
Fri Jan 17 10:54:17 IST 2014:使用基本服务器安全策略安装安全管理器。
2014年1月17日星期五10:54:17:访问被拒绝(“java.net.SocketPermission”“localhost:1527”“侦听,解析”)
java.security.AccessControlException:拒绝访问(“java.net.SocketPermission”“localhost:1527”“侦听,解析”)
位于java.security.AccessControlContext.checkPermission(AccessControlContext.java:372)
在java.security.AccessController.checkPermission(AccessController.java:559)
位于java.lang.SecurityManager.checkPermission(SecurityManager.java:549)
在java.lang.SecurityManager.checkListen(SecurityManager.java:1134)
位于java.net.ServerSocket.bind(ServerSocket.java:375)
位于java.net.ServerSocket.(ServerSocket.java:237)
位于javax.net.DefaultServerSocketFactory.createServerSocket(ServerSocketFactory.java:231)
位于org.apache.derby.impl.drda.NetworkServerControlImpl.createServerSocket(未知源)
位于org.apache.derby.impl.drda.NetworkServerControlImpl.access$000(未知来源)
位于org.apache.derby.impl.drda.NetworkServerControlImpl$1.run(未知源)
位于java.security.AccessController.doPrivileged(本机方法)
位于org.apache.derby.impl.drda.NetworkServerControlImpl.blockingStart(未知源)
位于org.apache.derby.impl.drda.NetworkServerControlImpl.executeWork(未知源)
位于org.apache.derby.drda.NetworkServerControl.main(未知源)

当我尝试启动我的JavaDB时,我得到了这个。这根本不起作用,我几乎尝试了互联网上的所有东西,非常感谢您的帮助,谢谢

通过在

编辑我的Java.policy文件来修复是的,但是仅仅修复侦听端口可能不足以完成此任务

当您查看derby文档时,请说:

您可以看到有相当多的重要权限。不仅仅是能够打开一个端口。 写入文件、读取文件等

因此,JRE 7比JRE 6更具限制性。 无法保证您的痛苦会像java策略中的锤子一样在侦听端口上放置一个简单的允许打开套接字

我的建议是:

(a) 调整策略文件。使用derby模板策略

(b) 调整startup datbase命令以定义所需的策略引用属性

例如,如果您正在使用玻璃鱼: asadmin启动数据库--jvmoptions=“-Dderby.install.url=%DERBY\u install\u url%-Dderby.system.home=%DERBY\u system\u home%”

其中DERBY_INSTALL_URL是右侧格式的字符串:
文件:/c/mypath/to/a/DERBY/intallFolder/lib/

    // ///////////////////////////////////////////
    // COPY PASTED PERMISSIONS FROM THE NET - MAKE SURE THE START DERBY COMMAND DEFINEDS THE ${derby.install.url}
    ///////////////////////////////////////////////


    // REFERENCES:
    // http://docs.oracle.com/javadb/10.8.3.0/adminguide/tadminnetservbasic.html
    // http://db.apache.org/derby/docs/10.11/adminguide/
    // This template policy file gives examples of how to configure the
    // permissions needed to run a Derby network server with the Java
    // Security manager.
    //
    grant codeBase "${derby.install.url}derby.jar" {
        //
        // These permissions are needed for everyday, embedded Derby usage.
        //
      permission java.lang.RuntimePermission "createClassLoader";
      permission java.util.PropertyPermission "derby.*", "read";
      permission java.util.PropertyPermission "user.dir", "read";
      permission java.util.PropertyPermission "derby.storage.jvmInstanceId", 
          "write"; 
      // The next two properties are used to determine if the VM is 32 or 64
      // bit.
      permission java.util.PropertyPermission "sun.arch.data.model", "read";
      permission java.util.PropertyPermission "os.arch", "read";
      permission java.io.FilePermission "${derby.system.home}","read";
      permission java.io.FilePermission "${derby.system.home}${/}-", 
          "read,write,delete";

        //
        // This permission lets a DBA reload the policy file while the server
        // is still running. The policy file is reloaded by invoking the
        // SYSCS_UTIL.SYSCS_RELOAD_SECURITY_POLICY() system procedure.
        //
          permission java.security.SecurityPermission "getPolicy";

        //
        // This permission lets you backup and restore databases
        // to and from arbitrary locations in your file system.
        //
        // This permission also lets you import/export data to and from
        // arbitrary locations in your file system.
        //
        // You may want to restrict this access to specific directories.
        //
          permission java.io.FilePermission "<<ALL FILES>>",
              "read,write,delete";


        //
        // Permissions needed for JMX based management and monitoring, which is
        // only available for JVMs supporting "platform management", that is
        // Java SE 5.0 or better.
        //
        // Allows this code to create an MBeanServer:
        //
          permission javax.management.MBeanServerPermission "createMBeanServer";
        //
        // Allows access to Derby's built-in MBeans, within the domain
        // org.apache.derby.
        // Derby must be allowed to register and unregister these MBeans.
        // It is possible to allow access only to specific MBeans, attributes or 
        // operations. To fine tune this permission, see the javadoc of 
        // javax.management.MBeanPermission or the JMX Instrumentation and Agent 
        // Specification. 
        //
          permission javax.management.MBeanPermission 
              "org.apache.derby.*#[org.apache.derby:*]",
              "registerMBean,unregisterMBean";
        //
        // Trusts Derby code to be a source of MBeans and to register these in
        // the MBean server.
        //
          permission javax.management.MBeanTrustPermission "register";

          // getProtectionDomain is an optional permission needed for printing
          // classpath information to derby.log
          permission java.lang.RuntimePermission "getProtectionDomain";

          //
          // The following permission must be granted for
          // Connection.abort(Executor) to work. Note that this permission
          // must also be granted to outer (application) code domains.
          //
          permission java.sql.SQLPermission "callAbort";
};


    // grant codeBase "${derby.install.url}derbynet.jar"{
    // grant codeBase "file:/D:/cranebox-package/package/cranebox/glassfish-v3/javadb/lib/derbynet.jar" {
    grant codeBase "${derby.install.url}derbynet.jar"{
        permission java.net.SocketPermission "localhost:1527", "listen";

    //
    // This permission lets the Network Server manage connections from
    // clients.
    //

    // Accept connections from any host. Derby is listening to the host
    // interface specified via the -h option to "NetworkServerControl
    // start" on the command line, via the address parameter to the
    // org.apache.derby.drda.NetworkServerControl constructor in the API
    // or via the property derby.drda.host; the default is localhost.
    // You may want to restrict allowed hosts, e.g. to hosts in a specific
    // subdomain, e.g. "*.example.com".

      permission java.net.SocketPermission "*", "accept"; 

    //
    // Needed for server tracing.
    //
      permission java.io.FilePermission "${derby.drda.traceDirectory}${/}-",
          "read,write,delete";

    //
    // JMX: Uncomment this permission to allow the ping operation of the 
    //      NetworkServerMBean to connect to the Network Server.
    //permission java.net.SocketPermission "*", "connect,resolve";


    //
    // Needed by sysinfo. The file permission is needed to
    // check the existence of jars on the classpath. You can
    // limit this permission to just the locations which hold
    // your jar files.
    //
    // In this template file, this block of permissions is granted
    // to derbynet.jar under the assumption that derbynet.jar is
    // the first jar file in your classpath which contains the
    // sysinfo classes. If that is not the case, then you will want
    // to grant this block of permissions to the first jar file
    // in your classpath which contains the sysinfo classes.
    // Those classes are bundled into the following Derby
    // jar files:
    //
    //    derbynet.jar
    //    derby.jar
    //    derbyclient.jar
    //    derbytools.jar
    //
      permission java.util.PropertyPermission "user.*", "read";
      permission java.util.PropertyPermission "java.home", "read";
      permission java.util.PropertyPermission "java.class.path", "read";
      permission java.util.PropertyPermission "java.runtime.version", "read";
      permission java.util.PropertyPermission "java.fullversion", "read";
      permission java.lang.RuntimePermission "getProtectionDomain";
      permission java.io.FilePermission "<<ALL FILES>>", "read";
      permission java.io.FilePermission "java.runtime.version", "read";
      permission java.io.FilePermission "java.fullversion", "read";
    };
/////////////////////////////////////////////
//从网络复制粘贴的权限-确保START DERBY命令定义了${DERBY.install.url}
///////////////////////////////////////////////
//参考资料:
// http://docs.oracle.com/javadb/10.8.3.0/adminguide/tadminnetservbasic.html
// http://db.apache.org/derby/docs/10.11/adminguide/
//此模板策略文件提供了如何配置
//使用Java运行Derby网络服务器所需的权限
//保安经理。
//
授予代码库“${derby.install.url}derby.jar”{
//
//这些权限是日常嵌入式Derby使用所必需的。
//
权限java.lang.RuntimePermission“createClassLoader”;
权限java.util.PropertyPermission“derby.*”、“read”;
权限java.util.PropertyPermission“user.dir”,“read”;
权限java.util.PropertyPermission“derby.storage.jvmInstanceId”,
“写”;
//接下来的两个属性用于确定VM是32还是64
//一点。
权限java.util.PropertyPermission“sun.arch.data.model”、“读取”;
权限java.util.PropertyPermission“os.arch”、“读取”;
权限java.io.FilePermission“${derby.system.home}”,“读取”;
权限java.io.FilePermission“${derby.system.home}${/}-”,
“读、写、删除”;
//
//此权限允许DBA在服务器运行时重新加载策略文件
//仍在运行。通过调用
//SYSCS\u UTIL.SYSCS\u RELOAD\u SECURITY\u POLICY()系统过程。
//
权限java.security.SecurityPermission“getPolicy”;
//
//此权限允许您备份和还原数据库
//往返于文件系统中的任意位置。
//
//此权限还允许您向和从导入/导出数据
//文件系统中的任意位置。
//
//您可能希望限制对特定目录的访问。
//
权限java.io.FilePermission“”,
“读、写、删除”;
//
//基于JMX的管理和监视所需的权限,即
//仅适用于支持“平台管理”的JVM,即
//JavaSE5.0或更高版本。
//
//允许此代码创建MBeanServer:
//
权限javax.management.MBeanServer权限“createMBeanServer”;
//
//允许访问域内Derby的内置MBean
//org.apache.derby。
//必须允许Derby注册和注销这些MBean。
//可以只允许访问特定的MBean、属性或属性
//要微调此权限,请参阅
//javax.management.MBeanPermission或JMX工具和代理
//规格。
//
权限javax.management.MBeanPermission
“org.apache.derby.*.#[org.apache.derby:*”,
“registerMBean,unregisterMBean”;
//
//信任Derby代码是MBean的源,并在
//M