Lines Matching refs:link

41  * Service-provider class for file systems. The methods defined by the {@link
47 * identified by a {@code URI} {@link #getScheme() scheme}. The default provider
48 * is identified by the URI scheme "file". It creates the {@link FileSystem} that
50 * The {@link FileSystems} class defines how file system providers are located
58 * <p> A provider is a factory for one or more {@link FileSystem} instances. Each
60 * the provider's {@link #getScheme scheme}. The default file system, for example,
63 * The {@link #newFileSystem newFileSystem} method may be used to create a file
64 * system, and the {@link #getFileSystem getFileSystem} method may be used to
105 * {@link RuntimePermission}<tt>("fileSystemProvider")</tt>
144 * providers as described by the {@link FileSystems} class.
191 * method is invoked by the {@link FileSystems#newFileSystem(URI,Map)}
200 * <p> This method throws {@link FileSystemAlreadyExistsException} if the
202 * invocation of this method. Once a file system is {@link
234 * created by invoking the {@link #newFileSystem(URI,Map) newFileSystem(URI,Map)}
235 * method. File systems created the {@link #newFileSystem(Path,Map)
242 * <p> Once a file system created by this provider is {@link
244 * method returns a reference to the closed file system or throws {@link
248 * closed (and before a new instance is created by the {@link #newFileSystem
253 * existing file system. In the case of the {@link FileSystems#getDefault
272 * Return a {@code Path} object by converting the given {@link URI}. The
273 * resulting {@code Path} is associated with a {@link FileSystem} that
280 * default {@link FileSystems#getDefault default} {@code FileSystem}.
283 * may require to check a permission. In the case of the {@link
347 * method works in exactly the manner specified by the {@link
351 * as if by invoking the {@link #newByteChannel} method and constructs a
370 * installed, the {@link SecurityManager#checkRead(String) checkRead}
390 * specified by the {@link Files#newOutputStream} method.
393 * as if by invoking the {@link #newByteChannel} method and constructs a
412 * installed, the {@link SecurityManager#checkWrite(String) checkWrite}
413 * method is invoked to check write access to the file. The {@link
440 * specified by the {@link FileChannel#open(Path,Set,FileAttribute[])
465 * In the case of the default file system, the {@link
467 * read access if the file is opened for reading. The {@link
482 * exactly the manner specified by the {@link
513 * In the case of the default file system, the {@link
515 * read access if the file is opened for reading. The {@link
530 * file. This method works in exactly the manner specified by the {@link
549 * if a file of that name already exists and the {@link
556 * installed, the {@link SecurityManager#checkRead(String) checkRead}
558 * opened for reading. The {@link SecurityManager#checkWrite(String)
560 * if the file is opened for writing. The {@link
571 * specified by the {@link
589 * installed, the {@link SecurityManager#checkRead(String) checkRead}
597 * specified by the {@link Files#createDirectory} method.
615 * installed, the {@link SecurityManager#checkWrite(String) checkWrite}
622 * Creates a symbolic link to a target. This method works in exactly the
623 * manner specified by the {@link Files#createSymbolicLink} method.
628 * @param link
629 * the path of the symbolic link to create
631 * the target of the symbolic link
634 * symbolic link
639 * creating the symbolic link
647 * is installed, it denies {@link LinkPermission}<tt>("symbolic")</tt>
648 * or its {@link SecurityManager#checkWrite(String) checkWrite}
649 * method denies write access to the path of the symbolic link.
651 public void createSymbolicLink(Path link, Path target, FileAttribute<?>... attrs)
658 * Creates a new link (directory entry) for an existing file. This method
659 * works in exactly the manner specified by the {@link Files#createLink}
665 * @param link
666 * the link (directory entry) to create
680 * is installed, it denies {@link LinkPermission}<tt>("hard")</tt>
681 * or its {@link SecurityManager#checkWrite(String) checkWrite}
682 * method denies write access to either the link or the
685 public void createLink(Path link, Path existing) throws IOException {
691 * {@link Files#delete} method.
706 * installed, the {@link SecurityManager#checkDelete(String)} method
713 * specified by the {@link Files#deleteIfExists} method.
715 * <p> The default implementation of this method simply invokes {@link
734 * installed, the {@link SecurityManager#checkDelete(String)} method
747 * Reads the target of a symbolic link. This method works in exactly the
748 * manner specified by the {@link Files#readSymbolicLink} method.
753 * @param link
754 * the path to the symbolic link
756 * @return The target of the symbolic link
762 * is not a symbolic link <i>(optional specific exception)</i>
768 * granted with the "{@code readlink}" action to read the link.
770 public Path readSymbolicLink(Path link) throws IOException {
776 * specified by the {@link Files#copy(Path,Path,CopyOption[])} method
801 * installed, the {@link SecurityManager#checkRead(String) checkRead}
803 * {@link SecurityManager#checkWrite(String) checkWrite} is invoked
804 * to check write access to the target file. If a symbolic link is
805 * copied the security manager is invoked to check {@link
813 * manner specified by the {@link Files#move} method except that both the
840 * installed, the {@link SecurityManager#checkWrite(String) checkWrite}
849 * manner specified by the {@link Files#isSameFile} method.
862 * installed, the {@link SecurityManager#checkRead(String) checkRead}
870 * works in exactly the manner specified by the {@link Files#isHidden}
873 * <p> This method is invoked by the {@link Files#isHidden isHidden} method.
884 * installed, the {@link SecurityManager#checkRead(String) checkRead}
890 * Returns the {@link FileStore} representing the file store where a file
892 * {@link Files#getFileStore} method.
903 * installed, the {@link SecurityManager#checkRead(String) checkRead}
905 * addition it checks {@link RuntimePermission}<tt>
913 * <p> This method may be used by the {@link Files#isReadable isReadable},
914 * {@link Files#isWritable isWritable} and {@link Files#isExecutable
925 * <td> {@link AccessMode#READ READ} </td>
930 * <td> {@link AccessMode#WRITE WRITE} </td>
935 * <td> {@link AccessMode#EXECUTE EXECUTE} </td>
937 * permission to {@link Runtime#exec execute} the file. The semantics
949 * object is a symbolic link. Depending on the implementation, this method
976 * installed, the {@link SecurityManager#checkRead(String) checkRead}
978 * existence of the file, the {@link SecurityManager#checkWrite(String)
980 * and {@link SecurityManager#checkExec(String) checkExec} is invoked
988 * exactly the manner specified by the {@link Files#getFileAttributeView}
1008 * exactly the manner specified by the {@link
1029 * installed, its {@link SecurityManager#checkRead(String) checkRead}
1037 * exactly the manner specified by the {@link
1059 * installed, its {@link SecurityManager#checkRead(String) checkRead}
1070 * manner specified by the {@link Files#setAttribute} method.
1095 * installed, its {@link SecurityManager#checkWrite(String) checkWrite}