[vlc-devel] commit: Add a new Sandbox Lua module to the luaintf framework. ( Antoine Cellerier )
git version control
git at videolan.org
Sat Mar 8 16:16:55 CET 2008
vlc | branch: master | Antoine Cellerier <dionoea at videolan.org> | Sat Mar 8 15:41:19 2008 +0100| [be03754018b7854f462ba937a6268e49bc451363]
Add a new Sandbox Lua module to the luaintf framework.
> http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit;h=be03754018b7854f462ba937a6268e49bc451363
---
share/luaintf/modules/sandbox.lua | 120 +++++++++++++++++++++++++++++++++++++
1 files changed, 120 insertions(+), 0 deletions(-)
diff --git a/share/luaintf/modules/sandbox.lua b/share/luaintf/modules/sandbox.lua
new file mode 100644
index 0000000..04d4762
--- /dev/null
+++ b/share/luaintf/modules/sandbox.lua
@@ -0,0 +1,120 @@
+--[==========================================================================[
+ sandbox.lua: Lua sandboxing facilities
+--[==========================================================================[
+ Copyright (C) 2007 the VideoLAN team
+ $Id$
+
+ Authors: Antoine Cellerier <dionoea at videolan dot org>
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
+--]==========================================================================]
+
+module("sandbox",package.seeall)
+
+-- See Programming in Lua (second edition) for sandbox examples
+-- See http://lua-users.org/wiki/SandBoxes for a list of SAFE/UNSAFE variables
+
+local sandbox_blacklist = {
+ collectgarbage = true,
+ dofile = true,
+ _G = true,
+ getfenv = true,
+ getmetatable = true,
+ load = true, -- Can be protected I guess
+ loadfile = true, -- Can be protected I guess
+ loadstring = true, -- Can be protected I guess
+ rawequal = true,
+ rawget = true,
+ rawset = true,
+ setfenv = true,
+ setmetatable = true,
+ module = true,
+ require = true,
+ package = true,
+ debug = true,
+}
+
+function readonly_table_proxy(name,src,blacklist)
+ if type(src)=="nil" then return end
+ if type(src)~="table" then error("2nd argument must be a table (or nil)") end
+ local name = name
+ local t = src
+ local blist = {}
+ if blacklist then
+ for _, v in pairs(blacklist) do
+ blist[v] = true
+ end
+ end
+ local metatable_readonly = {
+ __index = function(self,key)
+ if blist[key] then
+ error("Sandbox: Access to `"..name.."."..key.."' is forbidden.")
+ end
+ return t[key]
+ end,
+ __newindex = function(self,key,value)
+ error("It is forbidden to modify elements of this table.")
+ end,
+ }
+ return setmetatable({},metatable_readonly)
+end
+
+-- Of course, all of this is useless if the sandbox calling code has
+-- another reference to one of these tables in his global environement.
+local sandbox_proxy = {
+ coroutine = readonly_table_proxy("coroutine",coroutine),
+ string = readonly_table_proxy("string",string,{"dump"}),
+ table = readonly_table_proxy("table",table),
+ math = readonly_table_proxy("math",math),
+ io = readonly_table_proxy("io",io),
+ os = readonly_table_proxy("os",os,{"exit","getenv","remove",
+ "rename","setlocale"}),
+ sandbox = readonly_table_proxy("sandbox",sandbox),
+}
+
+function sandbox(func,override)
+ local _G = getfenv(2)
+ local override = override or {}
+ local sandbox_metatable =
+ {
+ __index = function(self,key)
+ if override[key] then
+ return override[key]
+ end
+ if sandbox_blacklist[key] then
+ error( "Sandbox: Access to `"..key.."' is forbidden." )
+ end
+ --print(key,"not found in env. Looking in sandbox_proxy and _G")
+ local value = sandbox_proxy[key] or _G[key]
+ rawset(self,key,value) -- Keep a local copy
+ return value
+ end,
+ __newindex = function(self,key,value)
+ if override and override[key] then
+ error( "Sandbox: Variable `"..key.."' is read only." )
+ end
+ return rawset(self,key,value)
+ end,
+ }
+ local sandbox_env = setmetatable({},sandbox_metatable)
+ return function(...)
+ setfenv(func,sandbox_env)
+ local ret = {func(...)} -- Not perfect (if func returns nil before
+ -- another return value) ... but it's better
+ -- than nothing
+ setfenv(func,_G)
+ return unpack(ret)
+ end
+end
\ No newline at end of file
More information about the vlc-devel
mailing list