forked from SeattleTestbed/repy_v2
-
Notifications
You must be signed in to change notification settings - Fork 0
/
safe.py
executable file
·755 lines (580 loc) · 24.2 KB
/
safe.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
"""
Authors: Phil Hassey, Armon Dadgar, Moshe Kaplan
Start Date: March 2007
Description:
There are 3 main components to this code:
Code safety analysis
This is done by creating an AST for the code, walking
through it node by node, and checking that only safe nodes
are used and that no unsafe strings are present.
Executing safe code
This is done by creating a dictionary with a key for each built-in function,
and then running the code using that dictionary as our 'context'.
SafeDict Class
This is a dict that prevents 'unsafe' values from being added.
SafeDict is used by virtual_namespace (for the safe eval) as the dictionary
of variables that will be accessible to the running code. The reason it is
important to prevent unsafe keys is because it is possible to use them to
break out of the sandbox. For example, it is possible to change an objects
private variables by manually bypassing python's name mangling.
The original version of this file was written by Phil Hassey. it has since
been heavily rewritten for use in the Seattle project.
Comments:
Licensing:
This file is public domain.
Authors Comments:
Known limitations:
- Safe doesn't have any testing for timeouts/DoS. One-liners
like these will lock up the system: "while 1: pass", "234234**234234"
This is handled by a seperate portion of Repy which manages the CPU
usage.
- Lots of (likely) safe builtins and safe AST Nodes are not allowed.
I suppose you can add them to the whitelist if you want them. I
trimmed it down as much as I thought I could get away with and still
have useful python code.
- Might not work with future versions of python - this is made with
python 2.4 in mind. _STR_NOT_BEGIN might have to be extended
in the future with more magic variable prefixes. Or you can
switch to conservative mode, but then even variables like "my_var"
won't work, which is sort of a nuisance.
- If you get data back from a safe_exec, don't call any functions
or methods - they might not be safe with __builtin__ restored
to its normal state. Work with them again via an additional safe_exec.
- The "context" sent to the functions is not tested at all. If you
pass in a dangerous function {'myfile':file} the code will be able
to call it.
"""
# Reference materials:
# Built-in Objects
# http://docs.python.org/lib/builtin.html
# AST Nodes - compiler
# http://docs.python.org/lib/module-compiler.ast.html
# Types and members - inspection
# http://docs.python.org/lib/inspect-types.html
# The standard type heirarchy
# http://docs.python.org/ref/types.html
# Based loosely on - Restricted "safe" eval - by Babar K. Zafar
# (it isn't very safe, but it got me started)
# http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/496746
# Securing Python: Controlling the abilities of the interpreter
# (or - why even trying this is likely to end in tears)
# http://us.pycon.org/common/talkdata/PyCon2007/062/PyCon_2007.pdf
import os # This is for some path manipulation
import sys # This is to get sys.executable to launch the external process
import time # This is to sleep
# Currently required to filter out Android-specific debug messages, cf #1080
# and safe_check() below
try:
import android
IS_ANDROID = True
except ImportError:
IS_ANDROID = False
# Hide the DeprecationWarning for compiler
import warnings
warnings.simplefilter('ignore')
import compiler # Required for the code safety check
warnings.resetwarnings()
import UserDict # This is to get DictMixin
import platform # This is for detecting Nokia tablets
import threading # This is to get a lock
import harshexit # This is to kill the external process on timeout
import subprocess # This is to start the external process
import __builtin__
import nonportable # This is to get the current runtime
import repy_constants # This is to get our start-up directory
import exception_hierarchy # This is for exception classes shared with tracebackrepy
# Fix to make repy compatible with Python 2.7.2 on Ubuntu 11.10 (ticket #1049)
subprocess.getattr = getattr
# Armon: This is how long we will wait for the external process
# to validate the safety of the user code before we timeout,
# and exit with an exception
# AR: Increasing timeout to 15 seconds, see r3410 / #744
EVALUTATION_TIMEOUT = 15
if platform.machine().startswith('armv'):
# The Nokia needs more time to evaluate code safety, especially
# when under heavy loads
EVALUTATION_TIMEOUT = 200
"""
Repyv2 Changes
NODE_ATTR_OK:
Allow '__' in strings.
Added: 'value'
_NODE_CLASS_OK:
Allow exceptions
Added: 'TryExcept', 'TryFinally', 'Raise', 'ExcepthandlerType', 'Invert',
_BUILTIN_OK:
Disallow exiting directly, use exitall instead.
Removed: 'exit', 'quit
Needed for tracebackrepy
Added: 'isinstance', 'BaseException', 'WindowsError', 'type', 'issubclass'
Allow primitive marshalling to be built
Added: 'ord', 'chr'
Repy V2 doesn't allow print()
Removed: 'Print', 'Printnl'
_STR_OK:
Added:
'__repr__', '__str__'
"""
# This portion of the code is for the Code safety analysis
# This is done by creating an AST for the code, walking
# through it node by node, and checking that only safe nodes
# are used and that no unsafe strings are present.
_STR_OK = ['__init__','__del__','__iter__', '__repr__', '__str__']
# __ is not allowed because it can be used to access a 'private' object in a class
# by bypassing Python's name mangling.
_STR_NOT_CONTAIN = ['__']
_STR_NOT_BEGIN = ['im_','func_','tb_','f_','co_',]
# Disallow these exact strings.
# encode and decode are not allowed because of the potential for encoding bugs (#982)
_STR_NOT_ALLOWED = ['encode','decode']
def _is_string_safe(token):
"""
<Purpose>
Checks if a string is safe based on rules defined in
_STR_OK, _STR_NOT_CONTAIN, and _STR_NOT_BEGIN
<Arguments>
token: A value to check.
<Returns>
True if token is safe, false otherwise
"""
# If it's not a string, return True
if type(token) is not str and type(token) is not unicode:
return True
# If the string is explicitly allowed, return True
if token in _STR_OK:
return True
# Check if the string is specifically prohibited:
if token in _STR_NOT_ALLOWED:
return False
# Check all the prohibited sub-strings
for forbidden_substring in _STR_NOT_CONTAIN:
if forbidden_substring in token:
return False
# Check all the prohibited prefixes
# Return True if it is safe.
return not token.startswith(tuple(_STR_NOT_BEGIN))
_NODE_CLASS_OK = [
'Add', 'And', 'AssAttr', 'AssList', 'AssName', 'AssTuple',
'Assert', 'Assign','AugAssign', 'Bitand', 'Bitor', 'Bitxor', 'Break',
'CallFunc', 'Class', 'Compare', 'Const', 'Continue',
'Dict', 'Discard', 'Div', 'Ellipsis', 'Expression', 'FloorDiv',
'For', 'Function', 'Getattr', 'If', 'Keyword',
'LeftShift', 'List', 'ListComp', 'ListCompFor', 'ListCompIf', 'Mod',
'Module', 'Mul', 'Name', 'Node', 'Not', 'Or', 'Pass', 'Power',
'Return', 'RightShift', 'Slice', 'Sliceobj',
'Stmt', 'Sub', 'Subscript', 'Tuple', 'UnaryAdd', 'UnarySub', 'While',
# New additions
'TryExcept', 'TryFinally', 'Raise', 'ExcepthandlerType', 'Invert',
]
_NODE_ATTR_OK = ['value']
def _check_node(node):
"""
<Purpose>
Examines a node, its attributes, and all of its children (recursively) for safety.
A node is safe if it is in _NODE_CLASS_OK and an attribute is safe if it is
not a unicode string and either in _NODE_ATTR_OK or is safe as is
defined by _is_string_safe()
<Arguments>
node: A node in an AST
<Exceptions>
CheckNodeException if an unsafe node is used
CheckStrException if an attribute has an unsafe string
<Return>
None
"""
if node.__class__.__name__ not in _NODE_CLASS_OK:
raise exception_hierarchy.CheckNodeException(node.lineno,node.__class__.__name__)
for attribute, value in node.__dict__.iteritems():
# Don't allow the construction of unicode literals
if type(value) == unicode:
raise exception_hierarchy.CheckStrException(node.lineno, attribute, value)
if attribute in _NODE_ATTR_OK:
continue
# JAC: don't check doc strings for __ and the like... (#889)
if attribute == 'doc' and (node.__class__.__name__ in
['Module', 'Function', 'Class']):
continue
# Check the safety of any strings
if not _is_string_safe(value):
raise exception_hierarchy.CheckStrException(node.lineno, attribute, value)
for child in node.getChildNodes():
_check_node(child)
def safe_check(code):
"""
<Purpose>
Takes the code as input, and parses it into an AST.
It then calls _check_node, which does a recursive safety check for every node.
<Arguments>
code: A string representation of python code
<Exceptions>
CheckNodeException if an unsafe node is used
CheckStrException if an attribute has an unsafe string
<Return>
None
"""
parsed_ast = compiler.parse(code)
_check_node(parsed_ast)
# End of the code safety checking implementation
# Start code safety checking wrappers
def safe_check_subprocess(code):
"""
<Purpose>
Runs safe_check() in a subprocess. This is done because the AST safe_check()
creates uses a large amount of RAM. By running safe_check() in a subprocess
we can guarantee that the memory will be reclaimed when the process ends.
<Arguments>
code: See safe_check.
<Exceptions>
As with safe_check.
<Return>
See safe_check.
"""
# Get the path to safe_check.py by using the original start directory of python
path_to_safe_check = os.path.join(repy_constants.REPY_START_DIR, "safe_check.py")
# Start a safety check process, reading from the user code and outputing to a pipe we can read
proc = subprocess.Popen([sys.executable, path_to_safe_check],stdin=subprocess.PIPE, stdout=subprocess.PIPE)
# Write out the user code, close so the other end gets an EOF
proc.stdin.write(code)
proc.stdin.close()
# Wait for the process to terminate
starttime = nonportable.getruntime()
# Only wait up to EVALUTATION_TIMEOUT seconds before terminating
while nonportable.getruntime() - starttime < EVALUTATION_TIMEOUT:
# Did the process finish running?
if proc.poll() != None:
break;
time.sleep(0.02)
else:
# Kill the timed-out process
try:
harshexit.portablekill(proc.pid)
except:
pass
raise Exception, "Evaluation of code safety exceeded timeout threshold \
("+str(nonportable.getruntime() - starttime)+" seconds)"
# Read the output and close the pipe
rawoutput = proc.stdout.read()
proc.stdout.close()
# Interim fix for #1080: Get rid of stray debugging output on Android
# of the form "dlopen libpython2.6.so" and "dlopen /system/lib/libc.so",
# yet preserve all of the other output (including empty lines).
if IS_ANDROID:
output = ""
for line in rawoutput.split("\n"):
# Preserve empty lines
if line == "":
output += "\n"
continue
# Suppress debug messages we know can turn up
wordlist = line.split()
if wordlist[0]=="dlopen":
if wordlist[-1]=="/system/lib/libc.so":
continue
if wordlist[-1].startswith("libpython") and \
wordlist[-1].endswith(".so"):
# We expect "libpython" + version number + ".so".
# The version number should be a string convertible to float.
# If it's not, raise an exception.
try:
versionstring = (wordlist[-1].replace("libpython",
"")).replace(".so", "")
junk = float(versionstring)
except TypeError, ValueError:
raise Exception("Unexpected debug output '" + line +
"' while evaluating code safety!")
else:
output += line + "\n"
# Strip off the last newline character we added
output = output[0:-1]
else: # We are *not* running on Android, proceed with unfiltered output
output = rawoutput
# Check the output, None is success, else it is a failure
if output == "None":
return True
# If there is no output, this is a fatal error condition
elif output == "":
raise Exception, "Fatal error while evaluating code safety!"
else:
# Raise the error from the output
raise exception_hierarchy.SafeException, output
# Get a lock for serial_safe_check
SAFE_CHECK_LOCK = threading.Lock()
# Wraps safe_check to serialize calls
def serial_safe_check(code):
"""
<Purpose>
Serializes calls to safe_check_subprocess(). This is because safe_check_subprocess()
creates a new process which may take many seconds to return. This prevents us from
creating many new python processes.
<Arguments>
code: See safe_check.
<Exceptions>
As with safe_check.
<Return>
See safe_check.
"""
SAFE_CHECK_LOCK.acquire()
try:
return safe_check_subprocess(code)
finally:
SAFE_CHECK_LOCK.release()
#End of static analysis portion
# This portion of the code is for the safe exec.
# The first step is to create a dictionary with a key for each built-in function
# We then replace all built-in functions with the values in that dictionary.
# We then run our code using that dictionary as our 'context'
# When we're done, we restore the original __builtin__ from a backup
# safe replacement for the built-in function `type()`
_type = type
_compile_type = _type(compile('','','exec'))
def safe_type(*args, **kwargs):
if len(args) != 1 or kwargs:
raise exception_hierarchy.RunBuiltinException(
'type() may only take exactly one non-keyword argument.')
# Fix for #1189
# if _type(args[0]) is _type or _type(args[0]) is _compile_type:
# raise exception_hierarchy.RunBuiltinException(
# 'unsafe type() call.')
# JAC: The above would be reasonable, but it is harsh. The wrapper code for
# the encasement library needs to have a way to check the type of things and
# these might be inadvertantly be types. It is hard to know if something
# is a type
if args[0] == safe_type or args[0] == _type or _type(args[0]) is _type:
return safe_type
if _type(args[0]) is _type or _type(args[0]) is _compile_type:
raise exception_hierarchy.RunBuiltinException(
'unsafe type() call.')
return _type(args[0])
# This dict maps built-in functions to their replacement functions
_BUILTIN_REPLACE = {
'type': safe_type
}
# The list of built-in exceptions can be generated by running the following:
# r = [v for v in dir(__builtin__) if v[0] != '_' and v[0] == v[0].upper()] ; r.sort() ; print r
_BUILTIN_OK = [
'__debug__',
'ArithmeticError', 'AssertionError', 'AttributeError', 'DeprecationWarning',
'EOFError', 'Ellipsis', 'EnvironmentError', 'Exception', 'False',
'FloatingPointError', 'FutureWarning', 'IOError', 'ImportError',
'IndentationError', 'IndexError', 'KeyError', 'KeyboardInterrupt',
'LookupError', 'MemoryError', 'NameError', 'None', 'NotImplemented',
'NotImplementedError', 'OSError', 'OverflowError', 'OverflowWarning',
'PendingDeprecationWarning', 'ReferenceError', 'RuntimeError', 'RuntimeWarning',
'StandardError', 'StopIteration', 'SyntaxError', 'SyntaxWarning', 'SystemError',
'SystemExit', 'TabError', 'True', 'TypeError', 'UnboundLocalError',
'UnicodeDecodeError', 'UnicodeEncodeError', 'UnicodeError',
'UnicodeTranslateError', 'UserWarning', 'ValueError', 'Warning', 'ZeroDivisionError',
'abs', 'bool', 'cmp', 'complex', 'dict', 'divmod', 'filter', 'float',
'frozenset', 'hex', 'id', 'int', 'len', 'list', 'long', 'map', 'max', 'min',
'object', 'oct', 'pow', 'range', 'reduce', 'repr', 'round', 'set', 'slice',
'str', 'sum', 'tuple', 'xrange', 'zip','id',
#Added for repyv2
'isinstance', 'BaseException', 'WindowsError', 'type', 'issubclass',
'ord', 'chr'
]
_BUILTIN_STR = ['copyright','credits','license','__name__','__doc__',]
def _replace_unsafe_builtin(unsafe_call):
# This function will replace any unsafe built-in function
def exceptionraiser(*vargs,**kargs):
raise exception_hierarchy.RunBuiltinException("Unsafe call '" +
str(unsafe_call) + "' with args '" + str(vargs) + "', kwargs '" +
str(kargs) + "'")
return exceptionraiser
# Stores the current list of allowed built-in functions.
_builtin_globals = None
# Stores a backup copy of all the built-in functions
_builtin_globals_backup = None
# Populates `_builtin_globals` with keys for every built-in function
# The values will either be the actual function (if safe), a replacement
# function, or a stub function that raises an exception.
def _builtin_init():
global _builtin_globals, _builtin_globals_backup
# If _builtin_init() was already called there's nothing to do
if _builtin_globals != None:
return
# Create a backup of the built-in functions
#TODO: Perhaps pull this out of the function - Is there a reason to do this more then once?
_builtin_globals_backup = __builtin__.__dict__.copy()
_builtin_globals = {}
for builtin in __builtin__.__dict__.iterkeys():
# It's important to check _BUILTIN_REPLACE before _BUILTIN_OK because
# even if the name is defined in both, there must be a security reason
# why it was supposed to be replaced, and not just allowed.
if builtin in _BUILTIN_REPLACE:
replacewith = _BUILTIN_REPLACE[builtin]
elif builtin in _BUILTIN_OK:
replacewith = __builtin__.__dict__[builtin]
elif builtin in _BUILTIN_STR:
replacewith = ''
else:
# Replace the function with our exception-raising variant
replacewith = _replace_unsafe_builtin(builtin)
_builtin_globals[builtin] = replacewith
# Armon: Make SafeDict available
_builtin_globals["SafeDict"] = get_SafeDict
# Make the repy exception hierarchy available
# This is done by making every exception in _EXPORTED_EXCEPTIONS
# available as a built-in
for exception_name in exception_hierarchy._EXPORTED_EXCEPTIONS:
_builtin_globals[exception_name] = exception_hierarchy.__dict__[exception_name]
# Replace every function in __builtin__ with the one from _builtin_globals.
def _builtin_destroy():
_builtin_init()
for builtin_name, builtin in _builtin_globals.iteritems():
__builtin__.__dict__[builtin_name] = builtin
# Restore every function in __builtin__ with the backup from _builtin_globals_backup.
def _builtin_restore():
for builtin_name, builtin in _builtin_globals_backup.iteritems():
__builtin__.__dict__[builtin_name] = builtin
# Have the builtins already been destroyed?
BUILTINS_DESTROYED = False
def safe_run(code,context=None):
"""
<Purpose>
Executes code with only safe builtins.
If context is passed in, those keys will be available to the code.
<Arguments>
code: A string representation of python code
context: A dictionary of variables to execute 'in'
<Exceptions>
exception_hierarchy.RunBuiltinException if an unsafe call is made
Whatever else the source code may raise
<Return>
None
"""
global BUILTINS_DESTROYED
if context == None:
context = {}
# Destroy the builtins if needed
if not BUILTINS_DESTROYED:
BUILTINS_DESTROYED = True
_builtin_destroy()
try:
context['__builtins__'] = _builtin_globals
exec code in context
finally:
#_builtin_restore()
pass
# Convenience functions
def safe_exec(code, context = None):
"""
<Purpose>
Checks the code for safety. It then executes code with only safe builtins.
This is a wrapper for calling serial_safe_check() and safe_run()
<Arguments>
code: A string representation of python code
context: A dictionary of variables to execute 'in'
<Exceptions>
CheckNodeException if an unsafe node is used
CheckStrException if an attribute has an unsafe string
exception_hierarchy.RunBuiltinException if an unsafe call is made
Whatever else the code may raise
<Return>
None
"""
serial_safe_check(code)
safe_run(code, context)
# This portion of the code defines a SafeDict
# A SafeDict prevents keys which are 'unsafe' strings from being added.
# Functional constructor for SafeDict to allow us to safely map it into the repy context.
def get_SafeDict(*args,**kwargs):
return SafeDict(*args,**kwargs)
class SafeDict(UserDict.DictMixin):
"""
<Purpose>
A dictionary implementation which prohibits "unsafe" keys from being set or
get. This is done by checking the key with _is_string_safe().
SafeDict is used by virtual_namespace (for the safe eval) as the dictionary
of variables that will be accessible to the running code. The reason it is
important to prevent unsafe keys is because it is possible to use them to
break out of the sandbox. For example, it is possible to change an object's
private variables by manually bypassing python's name mangling.
"""
def __init__(self,from_dict=None):
# Create the underlying dictionary
self.__under__ = {}
# Break if we are done...
if from_dict is None:
return
if type(from_dict) is not dict and not isinstance(from_dict,SafeDict):
return
# If we are given a dict, try to copy its keys
for key,value in from_dict.iteritems():
# Skip __builtins__ and __doc__ since safe_run/python inserts that
if key in ["__builtins__","__doc__"]:
continue
# Check the key type
if type(key) is not str and type(key) is not unicode:
raise TypeError, "'SafeDict' keys must be of string type!"
# Check if the key is safe
if _is_string_safe(key):
self.__under__[key] = value
# Throw an exception if the key is unsafe
else:
raise ValueError, "Unsafe key: '"+key+"'"
# Allow getting items
def __getitem__(self,key):
if type(key) is not str and type(key) is not unicode:
raise TypeError, "'SafeDict' keys must be of string type!"
if not _is_string_safe(key):
raise ValueError, "Unsafe key: '"+key+"'"
return self.__under__.__getitem__(key)
# Allow setting items
def __setitem__(self,key,value):
if type(key) is not str and type(key) is not unicode:
raise TypeError, "'SafeDict' keys must be of string type!"
if not _is_string_safe(key):
raise ValueError, "Unsafe key: '"+key+"'"
return self.__under__.__setitem__(key,value)
# Allow deleting items
def __delitem__(self,key):
if type(key) is not str and type(key) is not unicode:
raise TypeError, "'SafeDict' keys must be of string type!"
if not _is_string_safe(key):
raise ValueError, "Unsafe key: '"+key+"'"
return self.__under__.__delitem__(key)
# Allow checking if a key is set
def __contains__(self,key):
if type(key) is not str and type(key) is not unicode:
raise TypeError, "'SafeDict' keys must be of string type!"
if not _is_string_safe(key):
raise ValueError, "Unsafe key: '"+key+"'"
return key in self.__under__
# Return the key set
def keys(self):
# Filter out the unsafe keys from the underlying dict
safe_keys = []
for key in self.__under__.iterkeys():
if _is_string_safe(key):
safe_keys.append(key)
# Return the safe keys
return safe_keys
# allow us to be printed
# this gets around the __repr__ infinite loop issue ( #918 ) for simple cases
# It seems unlikely this is adequate for more complex cases (like safedicts
# that refer to each other)
def __repr__(self):
newdict = {}
for safekey in self.keys():
if self.__under__[safekey] == self:
newdict[safekey] = newdict
else:
newdict[safekey] = self.__under__[safekey]
return newdict.__repr__()
# Allow a copy of us
def copy(self):
# Create a new instance
copy_inst = SafeDict(self.__under__)
# Return the new instance
return copy_inst
# Make our fields read-only
# This means __getattr__ can do its normal thing, but any
# setters need to be overridden to prohibit adding/deleting/updating
def __setattr__(self,name,value):
# Allow setting __under__ on initialization
if name == "__under__" and name not in self.__dict__:
self.__dict__[name] = value
return
raise TypeError,"'SafeDict' attributes are read-only!"
def __delattr__(self,name):
raise TypeError,"'SafeDict' attributes are read-only!"