|
38 | 38 | import org.elasticsearch.core.Tuple; |
39 | 39 | import org.elasticsearch.env.Environment; |
40 | 40 | import org.elasticsearch.jdk.JarHell; |
| 41 | +import org.elasticsearch.jdk.RuntimeVersionFeature; |
41 | 42 | import org.elasticsearch.plugin.scanner.ClassReaders; |
42 | 43 | import org.elasticsearch.plugin.scanner.NamedComponentScanner; |
43 | 44 | import org.elasticsearch.plugins.Platforms; |
@@ -922,10 +923,12 @@ void jarHellCheck(PluginDescriptor candidateInfo, Path candidateDir, Path plugin |
922 | 923 | */ |
923 | 924 | private PluginDescriptor installPlugin(InstallablePlugin descriptor, Path tmpRoot, List<Path> deleteOnFailure) throws Exception { |
924 | 925 | final PluginDescriptor info = loadPluginInfo(tmpRoot); |
925 | | - PluginPolicyInfo pluginPolicy = PolicyUtil.getPluginPolicyInfo(tmpRoot, env.tmpDir()); |
926 | | - if (pluginPolicy != null) { |
927 | | - Set<String> permissions = PluginSecurity.getPermissionDescriptions(pluginPolicy, env.tmpDir()); |
928 | | - PluginSecurity.confirmPolicyExceptions(terminal, permissions, batch); |
| 926 | + if (RuntimeVersionFeature.isSecurityManagerAvailable()) { |
| 927 | + PluginPolicyInfo pluginPolicy = PolicyUtil.getPluginPolicyInfo(tmpRoot, env.tmpDir()); |
| 928 | + if (pluginPolicy != null) { |
| 929 | + Set<String> permissions = PluginSecurity.getPermissionDescriptions(pluginPolicy, env.tmpDir()); |
| 930 | + PluginSecurity.confirmPolicyExceptions(terminal, permissions, batch); |
| 931 | + } |
929 | 932 | } |
930 | 933 |
|
931 | 934 | // Validate that the downloaded plugin's ID matches what we expect from the descriptor. The |
|
0 commit comments