1998-08-10 19:42:37 +00:00
|
|
|
\section{\module{rexec} ---
|
|
|
|
Basic restricted execution framework.}
|
1998-07-23 17:59:49 +00:00
|
|
|
\declaremodule{standard}{rexec}
|
|
|
|
|
|
|
|
\modulesynopsis{Basic restricted execution framework.}
|
|
|
|
|
1998-03-14 07:08:02 +00:00
|
|
|
|
1996-09-10 17:37:05 +00:00
|
|
|
|
1998-02-13 06:58:54 +00:00
|
|
|
This module contains the \class{RExec} class, which supports
|
1998-05-08 13:27:38 +00:00
|
|
|
\method{r_eval()}, \method{r_execfile()}, \method{r_exec()}, and
|
1998-03-14 07:08:02 +00:00
|
|
|
\method{r_import()} methods, which are restricted versions of the standard
|
1998-05-08 13:27:38 +00:00
|
|
|
Python functions \method{eval()}, \method{execfile()} and
|
|
|
|
the \keyword{exec} and \keyword{import} statements.
|
1996-10-24 22:14:06 +00:00
|
|
|
Code executed in this restricted environment will
|
1996-10-22 01:11:19 +00:00
|
|
|
only have access to modules and functions that are deemed safe; you
|
1998-02-13 06:58:54 +00:00
|
|
|
can subclass \class{RExec} to add or remove capabilities as desired.
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-02-13 06:58:54 +00:00
|
|
|
\emph{Note:} The \class{RExec} class can prevent code from performing
|
1996-10-22 01:11:19 +00:00
|
|
|
unsafe operations like reading or writing disk files, or using TCP/IP
|
|
|
|
sockets. However, it does not protect against code using extremely
|
|
|
|
large amounts of memory or CPU time.
|
|
|
|
|
1998-03-14 07:08:02 +00:00
|
|
|
\begin{classdesc}{RExec}{\optional{hooks\optional{, verbose}}}
|
1998-02-13 06:58:54 +00:00
|
|
|
Returns an instance of the \class{RExec} class.
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-03-14 07:08:02 +00:00
|
|
|
\var{hooks} is an instance of the \class{RHooks} class or a subclass of it.
|
|
|
|
If it is omitted or \code{None}, the default \class{RHooks} class is
|
1996-10-24 22:14:06 +00:00
|
|
|
instantiated.
|
1998-02-13 06:58:54 +00:00
|
|
|
Whenever the \module{RExec} module searches for a module (even a
|
|
|
|
built-in one) or reads a module's code, it doesn't actually go out to
|
|
|
|
the file system itself. Rather, it calls methods of an \class{RHooks}
|
|
|
|
instance that was passed to or created by its constructor. (Actually,
|
|
|
|
the \class{RExec} object doesn't make these calls --- they are made by
|
|
|
|
a module loader object that's part of the \class{RExec} object. This
|
|
|
|
allows another level of flexibility, e.g. using packages.)
|
|
|
|
|
|
|
|
By providing an alternate \class{RHooks} object, we can control the
|
1996-10-22 01:11:19 +00:00
|
|
|
file system accesses made to import a module, without changing the
|
|
|
|
actual algorithm that controls the order in which those accesses are
|
1998-02-13 06:58:54 +00:00
|
|
|
made. For instance, we could substitute an \class{RHooks} object that
|
|
|
|
passes all filesystem requests to a file server elsewhere, via some
|
|
|
|
RPC mechanism such as ILU. Grail's applet loader uses this to support
|
1996-10-22 01:11:19 +00:00
|
|
|
importing applets from a URL for a directory.
|
|
|
|
|
1996-10-24 22:14:06 +00:00
|
|
|
If \var{verbose} is true, additional debugging output may be sent to
|
1996-10-22 01:11:19 +00:00
|
|
|
standard output.
|
1998-03-14 07:08:02 +00:00
|
|
|
\end{classdesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-02-13 06:58:54 +00:00
|
|
|
The \class{RExec} class has the following class attributes, which are
|
1998-03-14 07:08:02 +00:00
|
|
|
used by the \method{__init__()} method. Changing them on an existing
|
1998-02-13 06:58:54 +00:00
|
|
|
instance won't have any effect; instead, create a subclass of
|
|
|
|
\class{RExec} and assign them new values in the class definition.
|
|
|
|
Instances of the new class will then use those new values. All these
|
|
|
|
attributes are tuples of strings.
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{memberdesc}{nok_builtin_names}
|
1996-10-22 01:11:19 +00:00
|
|
|
Contains the names of built-in functions which will \emph{not} be
|
1996-10-24 22:14:06 +00:00
|
|
|
available to programs running in the restricted environment. The
|
1998-02-13 06:58:54 +00:00
|
|
|
value for \class{RExec} is \code{('open',} \code{'reload',}
|
1996-10-24 22:14:06 +00:00
|
|
|
\code{'__import__')}. (This gives the exceptions, because by far the
|
|
|
|
majority of built-in functions are harmless. A subclass that wants to
|
|
|
|
override this variable should probably start with the value from the
|
|
|
|
base class and concatenate additional forbidden functions --- when new
|
|
|
|
dangerous built-in functions are added to Python, they will also be
|
|
|
|
added to this module.)
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{memberdesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{memberdesc}{ok_builtin_modules}
|
1996-10-22 01:11:19 +00:00
|
|
|
Contains the names of built-in modules which can be safely imported.
|
1998-02-13 06:58:54 +00:00
|
|
|
The value for \class{RExec} is \code{('audioop',} \code{'array',}
|
1996-10-24 22:14:06 +00:00
|
|
|
\code{'binascii',} \code{'cmath',} \code{'errno',} \code{'imageop',}
|
|
|
|
\code{'marshal',} \code{'math',} \code{'md5',} \code{'operator',}
|
|
|
|
\code{'parser',} \code{'regex',} \code{'rotor',} \code{'select',}
|
|
|
|
\code{'strop',} \code{'struct',} \code{'time')}. A similar remark
|
|
|
|
about overriding this variable applies --- use the value from the base
|
|
|
|
class as a starting point.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{memberdesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{memberdesc}{ok_path}
|
1998-03-14 07:08:02 +00:00
|
|
|
Contains the directories which will be searched when an \keyword{import}
|
1996-10-22 01:11:19 +00:00
|
|
|
is performed in the restricted environment.
|
1998-02-13 06:58:54 +00:00
|
|
|
The value for \class{RExec} is the same as \code{sys.path} (at the time
|
1996-10-24 22:14:06 +00:00
|
|
|
the module is loaded) for unrestricted code.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{memberdesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{memberdesc}{ok_posix_names}
|
1996-10-22 01:11:19 +00:00
|
|
|
% Should this be called ok_os_names?
|
1998-03-14 07:08:02 +00:00
|
|
|
Contains the names of the functions in the \module{os} module which will be
|
1996-10-22 01:11:19 +00:00
|
|
|
available to programs running in the restricted environment. The
|
1998-02-13 06:58:54 +00:00
|
|
|
value for \class{RExec} is \code{('error',} \code{'fstat',}
|
1996-10-22 01:11:19 +00:00
|
|
|
\code{'listdir',} \code{'lstat',} \code{'readlink',} \code{'stat',}
|
|
|
|
\code{'times',} \code{'uname',} \code{'getpid',} \code{'getppid',}
|
|
|
|
\code{'getcwd',} \code{'getuid',} \code{'getgid',} \code{'geteuid',}
|
|
|
|
\code{'getegid')}.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{memberdesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{memberdesc}{ok_sys_names}
|
1998-03-14 07:08:02 +00:00
|
|
|
Contains the names of the functions and variables in the \module{sys}
|
1996-10-24 22:14:06 +00:00
|
|
|
module which will be available to programs running in the restricted
|
1998-02-13 06:58:54 +00:00
|
|
|
environment. The value for \class{RExec} is \code{('ps1',}
|
1996-10-24 22:14:06 +00:00
|
|
|
\code{'ps2',} \code{'copyright',} \code{'version',} \code{'platform',}
|
|
|
|
\code{'exit',} \code{'maxint')}.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{memberdesc}
|
|
|
|
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-02-13 06:58:54 +00:00
|
|
|
\class{RExec} instances support the following methods:
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{r_eval}{code}
|
1996-10-24 22:14:06 +00:00
|
|
|
\var{code} must either be a string containing a Python expression, or
|
|
|
|
a compiled code object, which will be evaluated in the restricted
|
1998-03-14 07:08:02 +00:00
|
|
|
environment's \module{__main__} module. The value of the expression or
|
1996-10-24 22:14:06 +00:00
|
|
|
code object will be returned.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{r_exec}{code}
|
1996-10-24 22:14:06 +00:00
|
|
|
\var{code} must either be a string containing one or more lines of
|
|
|
|
Python code, or a compiled code object, which will be executed in the
|
1998-03-14 07:08:02 +00:00
|
|
|
restricted environment's \module{__main__} module.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{r_execfile}{filename}
|
1996-10-22 01:11:19 +00:00
|
|
|
Execute the Python code contained in the file \var{filename} in the
|
1998-03-14 07:08:02 +00:00
|
|
|
restricted environment's \module{__main__} module.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-03-14 07:08:02 +00:00
|
|
|
Methods whose names begin with \samp{s_} are similar to the functions
|
|
|
|
beginning with \samp{r_}, but the code will be granted access to
|
1998-02-23 14:37:40 +00:00
|
|
|
restricted versions of the standard I/O streams \code{sys.stdin},
|
1998-03-14 07:08:02 +00:00
|
|
|
\code{sys.stderr}, and \code{sys.stdout}.
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{s_eval}{code}
|
1996-10-22 01:11:19 +00:00
|
|
|
\var{code} must be a string containing a Python expression, which will
|
|
|
|
be evaluated in the restricted environment.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{s_exec}{code}
|
1996-10-22 01:11:19 +00:00
|
|
|
\var{code} must be a string containing one or more lines of Python code,
|
|
|
|
which will be executed in the restricted environment.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{s_execfile}{code}
|
1996-10-22 01:11:19 +00:00
|
|
|
Execute the Python code contained in the file \var{filename} in the
|
|
|
|
restricted environment.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-02-13 06:58:54 +00:00
|
|
|
\class{RExec} objects must also support various methods which will be
|
1996-10-24 22:14:06 +00:00
|
|
|
implicitly called by code executing in the restricted environment.
|
|
|
|
Overriding these methods in a subclass is used to change the policies
|
|
|
|
enforced by a restricted environment.
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{r_import}{modulename\optional{, globals\optional{,
|
|
|
|
locals\optional{, fromlist}}}}
|
1998-03-14 07:08:02 +00:00
|
|
|
Import the module \var{modulename}, raising an \exception{ImportError}
|
1996-10-24 22:14:06 +00:00
|
|
|
exception if the module is considered unsafe.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{r_open}{filename\optional{, mode\optional{, bufsize}}}
|
1998-03-14 07:08:02 +00:00
|
|
|
Method called when \function{open()} is called in the restricted
|
|
|
|
environment. The arguments are identical to those of \function{open()},
|
1996-10-22 01:11:19 +00:00
|
|
|
and a file object (or a class instance compatible with file objects)
|
1998-02-13 06:58:54 +00:00
|
|
|
should be returned. \class{RExec}'s default behaviour is allow opening
|
1996-10-22 01:11:19 +00:00
|
|
|
any file for reading, but forbidding any attempt to write a file. See
|
1996-10-24 22:14:06 +00:00
|
|
|
the example below for an implementation of a less restrictive
|
1998-03-14 07:08:02 +00:00
|
|
|
\method{r_open()}.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{r_reload}{module}
|
1996-10-22 01:11:19 +00:00
|
|
|
Reload the module object \var{module}, re-parsing and re-initializing it.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{r_unload}{module}
|
1996-10-24 22:14:06 +00:00
|
|
|
Unload the module object \var{module} (i.e., remove it from the
|
|
|
|
restricted environment's \code{sys.modules} dictionary).
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1996-10-24 22:14:06 +00:00
|
|
|
And their equivalents with access to restricted standard I/O streams:
|
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{s_import}{modulename\optional{, globals\optional{,
|
|
|
|
locals\optional{, fromlist}}}}
|
1998-02-13 06:58:54 +00:00
|
|
|
Import the module \var{modulename}, raising an \exception{ImportError}
|
1996-10-24 22:14:06 +00:00
|
|
|
exception if the module is considered unsafe.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{s_reload}{module}
|
1996-10-22 01:11:19 +00:00
|
|
|
Reload the module object \var{module}, re-parsing and re-initializing it.
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-04-02 18:51:30 +00:00
|
|
|
\begin{methoddesc}{s_unload}{module}
|
1996-10-22 01:11:19 +00:00
|
|
|
Unload the module object \var{module}.
|
|
|
|
% XXX what are the semantics of this?
|
1998-04-02 18:51:30 +00:00
|
|
|
\end{methoddesc}
|
1996-10-22 01:11:19 +00:00
|
|
|
|
|
|
|
\subsection{An example}
|
|
|
|
|
|
|
|
Let us say that we want a slightly more relaxed policy than the
|
1998-02-13 06:58:54 +00:00
|
|
|
standard \class{RExec} class. For example, if we're willing to allow
|
|
|
|
files in \file{/tmp} to be written, we can subclass the \class{RExec}
|
|
|
|
class:
|
1996-10-22 01:11:19 +00:00
|
|
|
|
1998-02-13 06:58:54 +00:00
|
|
|
\begin{verbatim}
|
1996-10-22 01:11:19 +00:00
|
|
|
class TmpWriterRExec(rexec.RExec):
|
|
|
|
def r_open(self, file, mode='r', buf=-1):
|
1996-10-24 22:14:06 +00:00
|
|
|
if mode in ('r', 'rb'):
|
|
|
|
pass
|
|
|
|
elif mode in ('w', 'wb', 'a', 'ab'):
|
|
|
|
# check filename : must begin with /tmp/
|
|
|
|
if file[:5]!='/tmp/':
|
|
|
|
raise IOError, "can't write outside /tmp"
|
|
|
|
elif (string.find(file, '/../') >= 0 or
|
|
|
|
file[:3] == '../' or file[-3:] == '/..'):
|
|
|
|
raise IOError, "'..' in filename forbidden"
|
|
|
|
else: raise IOError, "Illegal open() mode"
|
1996-10-22 01:11:19 +00:00
|
|
|
return open(file, mode, buf)
|
1998-02-13 06:58:54 +00:00
|
|
|
\end{verbatim}
|
1997-07-17 16:34:52 +00:00
|
|
|
%
|
1996-10-22 01:11:19 +00:00
|
|
|
Notice that the above code will occasionally forbid a perfectly valid
|
|
|
|
filename; for example, code in the restricted environment won't be
|
|
|
|
able to open a file called \file{/tmp/foo/../bar}. To fix this, the
|
1998-03-14 07:08:02 +00:00
|
|
|
\method{r_open()} method would have to simplify the filename to
|
1996-10-22 01:11:19 +00:00
|
|
|
\file{/tmp/bar}, which would require splitting apart the filename and
|
|
|
|
performing various operations on it. In cases where security is at
|
|
|
|
stake, it may be preferable to write simple code which is sometimes
|
|
|
|
overly restrictive, instead of more general code that is also more
|
|
|
|
complex and may harbor a subtle security hole.
|