File: sandbox.lua

package info (click to toggle)
vlc 3.0.22-4
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 208,324 kB
  • sloc: ansic: 443,399; cpp: 111,127; objc: 36,399; sh: 6,737; makefile: 6,623; javascript: 4,902; xml: 1,611; asm: 1,355; yacc: 644; python: 321; lex: 88; perl: 77; sed: 16
file content (125 lines) | stat: -rw-r--r-- 4,500 bytes parent folder | download | duplicates (9)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
--[==========================================================================[
 sandbox.lua: Lua sandboxing facilities
--[==========================================================================[
 Copyright (C) 2007 the VideoLAN team

 Authors: Antoine Cellerier <dionoea at videolan dot org>

 This program is free software; you can redistribute it and/or modify
 it under the terms of the GNU General Public License as published by
 the Free Software Foundation; either version 2 of the License, or
 (at your option) any later version.

 This program is distributed in the hope that it will be useful,
 but WITHOUT ANY WARRANTY; without even the implied warranty of
 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 GNU General Public License for more details.

 You should have received a copy of the GNU General Public License
 along with this program; if not, write to the Free Software
 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
--]==========================================================================]

local sandbox = {}

-- See Programming in Lua (second edition) for sandbox examples
-- See http://lua-users.org/wiki/SandBoxes for a list of SAFE/UNSAFE variables

local sandbox_blacklist = {
    collectgarbage = true,
    dofile = true,
    _G = true,
    getfenv = true,
    getmetatable = true,
    load = true, -- Can be protected I guess
    loadfile = true, -- Can be protected I guess
    rawequal = true,
    rawget = true,
    rawset = true,
    setfenv = true,
    setmetatable = true,
    module = true,
    require = true,
    package = true,
    debug = true,
}

if _VERSION == "Lua 5.1" then
    sandbox_blacklist["loadstring"] = true
end

function sandbox.readonly_table_proxy(name,src,blacklist)
    if type(src)=="nil" then return end
    if type(src)~="table" then error("2nd argument must be a table (or nil)") end
    local name = name
    local t = src
    local blist = {}
    if blacklist then
        for _, v in pairs(blacklist) do
            blist[v] = true
        end
    end
    local metatable_readonly = {
        __index = function(self,key)
            if blist[key] then
                error("Sandbox: Access to `"..name.."."..key.."' is forbidden.")
            end
            return t[key]
        end,
        __newindex = function(self,key,value)
            error("It is forbidden to modify elements of this table.")
        end,
    }
    return setmetatable({},metatable_readonly)
end

-- Of course, all of this is useless if the sandbox calling code has
-- another reference to one of these tables in his global environement.
local sandbox_proxy = {
    coroutine   = sandbox.readonly_table_proxy("coroutine",coroutine),
    string      = sandbox.readonly_table_proxy("string",string,{"dump"}),
    table       = sandbox.readonly_table_proxy("table",table),
    math        = sandbox.readonly_table_proxy("math",math),
    io          = sandbox.readonly_table_proxy("io",io),
    os          = sandbox.readonly_table_proxy("os",os,{"exit","getenv","remove",
                                                        "rename","setlocale"}),
    sandbox     = sandbox.readonly_table_proxy("sandbox",sandbox),
}

function sandbox.sandbox(func,override)
    local _G = getfenv(2)
    local override = override or {}
    local sandbox_metatable =
    {
        __index = function(self,key)
            if override[key] then
                return override[key]
            end
            if sandbox_blacklist[key] then
                error( "Sandbox: Access to `"..key.."' is forbidden." )
            end
            --print(key,"not found in env. Looking in sandbox_proxy and _G")
            local value = sandbox_proxy[key] or _G[key]
            rawset(self,key,value) -- Keep a local copy
            return value
        end,
        __newindex = function(self,key,value)
            if override and override[key] then
                error( "Sandbox: Variable `"..key.."' is read only." )
            end
            return rawset(self,key,value)
        end,
    }
    local sandbox_env = setmetatable({},sandbox_metatable)
    return function(...)
        setfenv(func,sandbox_env)
        local ret = {func(...)} -- Not perfect (if func returns nil before
                                -- another return value) ... but it's better
                                -- than nothing
        setfenv(func,_G)
        return unpack(ret)
    end
end

_G.sandbox = sandbox
return sandbox