summaryrefslogtreecommitdiff
path: root/eval_safe.c
diff options
context:
space:
mode:
authorko1 <ko1@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>2007-12-20 09:29:46 +0000
committerko1 <ko1@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>2007-12-20 09:29:46 +0000
commitc334a09f7ad58c692ec86e1d55c561e86806260b (patch)
tree3f213d5f67e93eb9ebf38692865f89b0608afda4 /eval_safe.c
parentc9923aeb6931f68ce600bbeb0f3c89aebf328a5b (diff)
* common.mk, *.ci: renamed to *.c.
* eval_laod.c: renamed to load.c. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@14364 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
Diffstat (limited to 'eval_safe.c')
-rw-r--r--eval_safe.c111
1 files changed, 111 insertions, 0 deletions
diff --git a/eval_safe.c b/eval_safe.c
new file mode 100644
index 0000000000..7d0a077880
--- /dev/null
+++ b/eval_safe.c
@@ -0,0 +1,111 @@
+/* -*-c-*- */
+/*
+ * This file is included by eval.c
+ */
+
+/* safe-level:
+ 0 - strings from streams/environment/ARGV are tainted (default)
+ 1 - no dangerous operation by tainted value
+ 2 - process/file operations prohibited
+ 3 - all generated objects are tainted
+ 4 - no global (non-tainted) variable modification/no direct output
+*/
+
+#define SAFE_LEVEL_MAX 4
+
+/* $SAFE accessor */
+
+int
+rb_safe_level(void)
+{
+ return GET_THREAD()->safe_level;
+}
+
+void
+rb_set_safe_level_force(int safe)
+{
+ GET_THREAD()->safe_level = safe;
+}
+
+void
+rb_set_safe_level(int level)
+{
+ rb_thread_t *th = GET_THREAD();
+
+ if (level > th->safe_level) {
+ if (level > SAFE_LEVEL_MAX) {
+ level = SAFE_LEVEL_MAX;
+ }
+ th->safe_level = level;
+ }
+}
+
+static VALUE
+safe_getter(void)
+{
+ return INT2NUM(rb_safe_level());
+}
+
+static void
+safe_setter(VALUE val)
+{
+ int level = NUM2INT(val);
+ rb_thread_t *th = GET_THREAD();
+
+ if (level < th->safe_level) {
+ rb_raise(rb_eSecurityError,
+ "tried to downgrade safe level from %d to %d",
+ th->safe_level, level);
+ }
+ if (level > SAFE_LEVEL_MAX) {
+ level = SAFE_LEVEL_MAX;
+ }
+ th->safe_level = level;
+}
+
+void
+rb_secure(int level)
+{
+ if (level <= rb_safe_level()) {
+ if (rb_frame_callee()) {
+ rb_raise(rb_eSecurityError, "Insecure operation `%s' at level %d",
+ rb_id2name(rb_frame_callee()), rb_safe_level());
+ }
+ else {
+ rb_raise(rb_eSecurityError, "Insecure operation at level %d",
+ rb_safe_level());
+ }
+ }
+}
+
+void
+rb_secure_update(VALUE obj)
+{
+ if (!OBJ_TAINTED(obj))
+ rb_secure(4);
+}
+
+void
+rb_check_safe_obj(VALUE x)
+{
+ if (rb_safe_level() > 0 && OBJ_TAINTED(x)) {
+ if (rb_frame_callee()) {
+ rb_raise(rb_eSecurityError, "Insecure operation - %s",
+ rb_id2name(rb_frame_callee()));
+ }
+ else {
+ rb_raise(rb_eSecurityError, "Insecure operation: -r");
+ }
+ }
+ rb_secure(4);
+}
+
+void
+rb_check_safe_str(VALUE x)
+{
+ rb_check_safe_obj(x);
+ if (TYPE(x) != T_STRING) {
+ rb_raise(rb_eTypeError, "wrong argument type %s (expected String)",
+ rb_obj_classname(x));
+ }
+}