Brett Cannon wrote:
> On 7/5/06, Talin <[EMAIL PROTECTED]> wrote:
>> Transitioning from the checked to the unchecked state could only be done
>> via C code. So the 'file' wrapper, for example, would switch over to the
>> unchecked interpreter before calling th
Brett Cannon wrote:
> On 7/6/06, Talin <[EMAIL PROTECTED]> wrote:
>> And if we can call it for every operation, then we don't have to spend
>> time hunting down all of the possible loopholes and ways in which 'file'
>> or other restricted objects might be
he 'real' file
handle - in other words, replace the 'file-like object' wrapper with a
'config-like object' wrapper.
Merely passing the poisoned file handle to 'config' doesn't work,
because 'config' doesn't know how to safely handle
e( path, perms ):
if perms == 'r':
# Trivial example, a real proxy would be more
# sophisticated, and probably configurable.
return protect( file( path, perms ),
methods=set('ope
101 - 104 of 104 matches
Mail list logo