Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
C
codejail
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
edx
codejail
Commits
668537a1
Commit
668537a1
authored
Feb 26, 2013
by
Ned Batchelder
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Prevent a print statement from accidentally borking the sandbox.
parent
8da5abcd
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
32 additions
and
4 deletions
+32
-4
codejail/safe_exec.py
+27
-4
codejail/tests/test_safe_exec.py
+5
-0
No files found.
codejail/safe_exec.py
View file @
668537a1
...
...
@@ -46,9 +46,24 @@ def safe_exec(code, globals_dict, assumed_imports=None, files=None, python_path=
the_code
=
[]
files
=
list
(
files
or
())
the_code
.
append
(
textwrap
.
dedent
(
"""
\
the_code
.
append
(
textwrap
.
dedent
(
"""
import json
import sys
"""
# We need to prevent the sandboxed code from printing to stdout,
# or it will pollute the json we print there. This isn't a
# security concern (they can put any values in the json output
# anyway, either by writing to sys.__stdout__, or just by defining
# global values), but keeps accidents from happening.
"""
class DevNull(object):
def write(self, *args, **kwargs):
pass
sys.stdout = DevNull()
"""
# Read the code and the globals from the stdin.
"""
code, g_dict = json.load(sys.stdin)
"""
))
...
...
@@ -62,12 +77,20 @@ def safe_exec(code, globals_dict, assumed_imports=None, files=None, python_path=
for
name
,
modname
in
names_and_modules
(
assumed_imports
):
the_code
.
append
(
"g_dict['{}'] = LazyModule('{}')
\n
"
.
format
(
name
,
modname
))
the_code
.
append
(
textwrap
.
dedent
(
"""
\
the_code
.
append
(
textwrap
.
dedent
(
# Execute the sandboxed code.
"""
exec code in g_dict
"""
# Clean the globals for sending back as JSON over stdout.
"""
ok_types = (type(None), int, long, float, str, unicode, list, tuple, dict)
bad_keys = ("__builtins__",)
g_dict = {k:v for k,v in g_dict.iteritems() if isinstance(v, ok_types) and k not in bad_keys}
json.dump(g_dict, sys.stdout)
"""
# Write the globals back to the calling process.
"""
json.dump(g_dict, sys.__stdout__)
"""
))
stdin
=
json
.
dumps
([
code
,
globals_dict
])
...
...
@@ -82,7 +105,7 @@ def safe_exec(code, globals_dict, assumed_imports=None, files=None, python_path=
res
=
jailpy
.
jailpy
(
jailed_code
,
stdin
=
stdin
,
files
=
files
)
if
res
.
status
!=
0
:
raise
Exception
(
"Couldn't ex
c
ecute jailed code:
%
s"
%
res
.
stderr
)
raise
Exception
(
"Couldn't execute jailed code:
%
s"
%
res
.
stderr
)
globals_dict
.
update
(
json
.
loads
(
res
.
stdout
))
...
...
codejail/tests/test_safe_exec.py
View file @
668537a1
...
...
@@ -54,6 +54,11 @@ class SafeExecTests(object):
"""
),
g
)
self
.
assertEqual
(
g
[
'x'
],
1723
)
def
test_printing_stuff_when_you_shouldnt
(
self
):
g
=
{}
self
.
safe_exec
(
"a = 17; print 'hi!'"
,
g
)
self
.
assertEqual
(
g
[
'a'
],
17
)
class
TestSafeExec
(
SafeExecTests
,
unittest
.
TestCase
):
"""Run SafeExecTests, with the real safe_exec."""
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment