Mercurial > pydertron
annotate pydertron.py @ 4:ae5869491e61
Added more to securablemodule impl.
| author | Atul Varma <varmaa@toolness.com> |
|---|---|
| date | Wed, 09 Sep 2009 22:18:35 -0700 |
| parents | 14d8d73774d7 |
| children | c11c84274192 |
| rev | line source |
|---|---|
| 0 | 1 import sys |
| 2 import time | |
| 3 import threading | |
| 4 import traceback | |
| 5 import weakref | |
| 6 import types | |
| 7 | |
| 8 import pydermonkey | |
| 9 | |
| 10 class ContextWatchdogThread(threading.Thread): | |
| 11 """ | |
| 12 Watches active JS contexts and triggers their operation callbacks | |
| 13 at a regular interval. | |
| 14 """ | |
| 15 | |
| 16 # Default interval, in seconds, that the operation callbacks are | |
| 17 # triggered at. | |
| 18 DEFAULT_INTERVAL = 0.25 | |
| 19 | |
| 20 def __init__(self, interval=DEFAULT_INTERVAL): | |
| 21 threading.Thread.__init__(self) | |
| 22 self._lock = threading.Lock() | |
| 23 self._stop = threading.Event() | |
| 24 self._contexts = [] | |
| 25 self.interval = interval | |
| 26 self.setDaemon(True) | |
| 27 | |
| 28 def add_context(self, cx): | |
| 29 self._lock.acquire() | |
| 30 try: | |
| 31 self._contexts.append(weakref.ref(cx)) | |
| 32 finally: | |
| 33 self._lock.release() | |
| 34 | |
| 35 def join(self): | |
| 36 self._stop.set() | |
| 37 threading.Thread.join(self) | |
| 38 | |
| 39 def run(self): | |
| 40 while not self._stop.isSet(): | |
| 41 time.sleep(self.interval) | |
| 42 new_list = [] | |
| 43 self._lock.acquire() | |
| 44 try: | |
| 45 for weakcx in self._contexts: | |
| 46 cx = weakcx() | |
| 47 if cx: | |
| 48 new_list.append(weakcx) | |
| 49 cx.trigger_operation_callback() | |
| 50 self._contexts = new_list | |
| 51 finally: | |
| 52 self._lock.release() | |
| 53 | |
| 54 # Create a global watchdog. | |
| 55 watchdog = ContextWatchdogThread() | |
| 56 watchdog.start() | |
| 57 | |
| 58 class InternalError(BaseException): | |
| 59 """ | |
| 60 Represents an error in a JS-wrapped Python function that wasn't | |
| 61 expected to happen; because it's derived from BaseException, it | |
| 62 unrolls the whole JS/Python stack so that the error can be | |
| 63 reported to the outermost calling code. | |
| 64 """ | |
| 65 | |
| 66 def __init__(self): | |
| 67 BaseException.__init__(self) | |
| 68 self.exc_info = sys.exc_info() | |
| 69 | |
| 70 class SafeJsObjectWrapper(object): | |
| 71 """ | |
| 72 Securely wraps a JS object to behave like any normal Python object. | |
| 73 """ | |
| 74 | |
| 75 __slots__ = ['_jsobject', '_sandbox', '_this'] | |
| 76 | |
| 77 def __init__(self, sandbox, jsobject, this): | |
| 78 if not isinstance(jsobject, pydermonkey.Object): | |
| 79 raise TypeError("Cannot wrap '%s' object" % | |
| 80 type(jsobject).__name__) | |
| 81 object.__setattr__(self, '_sandbox', sandbox) | |
| 82 object.__setattr__(self, '_jsobject', jsobject) | |
| 83 object.__setattr__(self, '_this', this) | |
| 84 | |
| 85 @property | |
| 86 def wrapped_jsobject(self): | |
| 87 return self._jsobject | |
| 88 | |
| 89 def _wrap_to_python(self, jsvalue): | |
| 90 return self._sandbox.wrap_jsobject(jsvalue, self._jsobject) | |
| 91 | |
| 92 def _wrap_to_js(self, value): | |
| 93 return self._sandbox.wrap_pyobject(value) | |
| 94 | |
| 95 def __eq__(self, other): | |
| 96 if isinstance(other, SafeJsObjectWrapper): | |
| 97 return self._jsobject == other._jsobject | |
| 98 else: | |
| 99 return False | |
| 100 | |
| 101 def __str__(self): | |
| 102 return self.toString() | |
| 103 | |
| 104 def __unicode__(self): | |
| 105 return self.toString() | |
| 106 | |
| 107 def __setitem__(self, item, value): | |
| 108 self.__setattr__(item, value) | |
| 109 | |
| 110 def __setattr__(self, name, value): | |
| 111 cx = self._sandbox.cx | |
| 112 jsobject = self._jsobject | |
| 113 | |
| 114 cx.define_property(jsobject, name, | |
| 115 self._wrap_to_js(value)) | |
| 116 | |
| 117 def __getitem__(self, item): | |
| 118 return self.__getattr__(item) | |
| 119 | |
| 120 def __getattr__(self, name): | |
| 121 cx = self._sandbox.cx | |
| 122 jsobject = self._jsobject | |
| 123 | |
| 124 return self._wrap_to_python(cx.get_property(jsobject, name)) | |
| 125 | |
| 126 def __contains__(self, item): | |
| 127 cx = self._sandbox.cx | |
| 128 jsobject = self._jsobject | |
| 129 | |
| 130 return cx.has_property(jsobject, item) | |
| 131 | |
| 132 def __iter__(self): | |
| 133 cx = self._sandbox.cx | |
| 134 jsobject = self._jsobject | |
| 135 | |
| 136 properties = cx.enumerate(jsobject) | |
| 137 for property in properties: | |
| 138 yield property | |
| 139 | |
| 140 class SafeJsFunctionWrapper(SafeJsObjectWrapper): | |
| 141 """ | |
| 142 Securely wraps a JS function to behave like any normal Python object. | |
| 143 """ | |
| 144 | |
| 145 def __init__(self, sandbox, jsfunction, this): | |
| 146 if not isinstance(jsfunction, pydermonkey.Function): | |
| 147 raise TypeError("Cannot wrap '%s' object" % | |
| 148 type(jsobject).__name__) | |
| 149 SafeJsObjectWrapper.__init__(self, sandbox, jsfunction, this) | |
| 150 | |
| 151 def __call__(self, *args): | |
| 152 cx = self._sandbox.cx | |
| 153 jsobject = self._jsobject | |
| 154 this = self._this | |
| 155 | |
| 156 arglist = [] | |
| 157 for arg in args: | |
| 158 arglist.append(self._wrap_to_js(arg)) | |
| 159 | |
| 160 obj = cx.call_function(this, jsobject, tuple(arglist)) | |
| 161 return self._wrap_to_python(obj) | |
| 162 | |
| 163 def format_stack(js_stack): | |
| 164 """ | |
| 165 Returns a formatted Python-esque stack traceback of the given | |
| 166 JS stack. | |
| 167 """ | |
| 168 | |
| 169 STACK_LINE =" File \"%(filename)s\", line %(lineno)d, in %(name)s" | |
| 170 | |
| 171 lines = [] | |
| 172 while js_stack: | |
| 173 script = js_stack['script'] | |
| 174 function = js_stack['function'] | |
| 175 if script: | |
| 176 frameinfo = dict(filename = script.filename, | |
| 177 lineno = js_stack['lineno'], | |
| 178 name = '<module>') | |
| 179 elif function and not function.is_python: | |
| 180 frameinfo = dict(filename = function.filename, | |
| 181 lineno = js_stack['lineno'], | |
| 182 name = function.name) | |
| 183 else: | |
| 184 frameinfo = None | |
| 185 if frameinfo: | |
| 186 lines.insert(0, STACK_LINE % frameinfo) | |
| 187 try: | |
| 188 filelines = open(frameinfo['filename']).readlines() | |
| 189 line = filelines[frameinfo['lineno'] - 1].strip() | |
| 190 lines.insert(1, " %s" % line) | |
| 191 except Exception: | |
| 192 pass | |
| 193 js_stack = js_stack['caller'] | |
| 194 lines.insert(0, "Traceback (most recent call last):") | |
| 195 return '\n'.join(lines) | |
| 196 | |
| 197 def jsexposed(name=None, on=None): | |
| 198 """ | |
| 199 Decorator used to expose the decorated function or method to | |
| 200 untrusted JS. | |
| 201 | |
| 202 'name' is an optional alternative name for the function. | |
| 203 | |
| 204 'on' is an optional SafeJsObjectWrapper that the function can be | |
| 205 automatically attached as a property to. | |
| 206 """ | |
| 207 | |
| 208 if callable(name): | |
| 209 func = name | |
| 210 func.__jsexposed__ = True | |
| 211 return func | |
| 212 | |
| 213 def make_exposed(func): | |
| 214 if name: | |
| 215 func.__name__ = name | |
| 216 func.__jsexposed__ = True | |
| 217 if on: | |
| 218 on[func.__name__] = func | |
| 219 return func | |
| 220 return make_exposed | |
| 221 | |
| 222 class JsExposedObject(object): | |
| 223 """ | |
| 224 Trivial base/mixin class for any Python classes that choose to | |
| 225 expose themselves to JS code. | |
| 226 """ | |
| 227 | |
| 228 pass | |
| 229 | |
| 230 class JsSandbox(object): | |
| 231 """ | |
| 232 A JS runtime and associated functionality capable of securely | |
| 233 loading and executing scripts. | |
| 234 """ | |
| 235 | |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
236 def __init__(self, watchdog=watchdog): |
| 0 | 237 rt = pydermonkey.Runtime() |
| 238 cx = rt.new_context() | |
|
2
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
239 root_proto = cx.new_object() |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
240 cx.init_standard_classes(root_proto) |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
241 root = cx.new_object(None, root_proto) |
| 0 | 242 |
| 243 cx.set_operation_callback(self._opcb) | |
| 244 cx.set_throw_hook(self._throwhook) | |
| 245 watchdog.add_context(cx) | |
| 246 | |
| 247 self.rt = rt | |
| 248 self.cx = cx | |
| 249 self.curr_exc = None | |
| 250 self.py_stack = None | |
| 251 self.js_stack = None | |
| 252 self.__py_to_js = {} | |
| 253 self.__type_protos = {} | |
|
2
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
254 self.root_proto = root_proto |
| 0 | 255 self.root = self.wrap_jsobject(root, root) |
| 256 | |
| 257 def finish(self): | |
| 258 """ | |
| 259 Cleans up all resources used by the sandbox, breaking any reference | |
| 260 cycles created due to issue #2 in pydermonkey: | |
| 261 | |
| 262 http://code.google.com/p/pydermonkey/issues/detail?id=2 | |
| 263 """ | |
| 264 | |
| 265 for jsobj in self.__py_to_js.values(): | |
| 266 self.cx.clear_object_private(jsobj) | |
| 267 del self.__py_to_js | |
| 268 del self.__type_protos | |
| 269 del self.curr_exc | |
| 270 del self.py_stack | |
| 271 del self.js_stack | |
| 272 del self.cx | |
| 273 del self.rt | |
| 274 | |
| 275 def _opcb(self, cx): | |
| 276 # Don't do anything; if a keyboard interrupt was triggered, | |
| 277 # it'll get raised here automatically. | |
| 278 pass | |
| 279 | |
| 280 def _throwhook(self, cx): | |
| 281 curr_exc = cx.get_pending_exception() | |
| 282 if self.curr_exc != curr_exc: | |
| 283 self.curr_exc = curr_exc | |
| 284 self.py_stack = traceback.extract_stack() | |
| 285 self.js_stack = cx.get_stack() | |
| 286 | |
| 287 def __wrap_pycallable(self, func, pyproto=None): | |
| 288 if func in self.__py_to_js: | |
| 289 return self.__py_to_js[func] | |
| 290 | |
| 291 if hasattr(func, '__name__'): | |
| 292 name = func.__name__ | |
| 293 else: | |
| 294 name = "" | |
| 295 | |
| 296 if pyproto: | |
| 297 def wrapper(func_cx, this, args): | |
| 298 try: | |
| 299 arglist = [] | |
| 300 for arg in args: | |
| 301 arglist.append(self.wrap_jsobject(arg)) | |
| 302 instance = func_cx.get_object_private(this) | |
| 303 if instance is None or not isinstance(instance, pyproto): | |
| 304 raise pydermonkey.error("Method type mismatch") | |
| 305 | |
| 306 # TODO: Fill in extra required params with | |
| 307 # pymonkey.undefined? or automatically throw an | |
| 308 # exception to calling js code? | |
| 309 return self.wrap_pyobject(func(instance, *arglist)) | |
| 310 except pydermonkey.error: | |
| 311 raise | |
| 312 except Exception: | |
| 313 raise InternalError() | |
| 314 else: | |
| 315 def wrapper(func_cx, this, args): | |
| 316 try: | |
| 317 arglist = [] | |
| 318 for arg in args: | |
| 319 arglist.append(self.wrap_jsobject(arg)) | |
| 320 | |
| 321 # TODO: Fill in extra required params with | |
| 322 # pymonkey.undefined? or automatically throw an | |
| 323 # exception to calling js code? | |
| 324 return self.wrap_pyobject(func(*arglist)) | |
| 325 except pydermonkey.error: | |
| 326 raise | |
| 327 except Exception: | |
| 328 raise InternalError() | |
| 329 wrapper.wrapped_pyobject = func | |
| 330 wrapper.__name__ = name | |
| 331 | |
| 332 jsfunc = self.cx.new_function(wrapper, name) | |
| 333 self.__py_to_js[func] = jsfunc | |
| 334 | |
| 335 return jsfunc | |
| 336 | |
| 337 def __wrap_pyinstance(self, value): | |
| 338 pyproto = type(value) | |
| 339 if pyproto not in self.__type_protos: | |
| 340 jsproto = self.cx.new_object() | |
| 341 if hasattr(pyproto, '__jsprops__'): | |
| 342 define_getter = self.cx.get_property(jsproto, | |
| 343 '__defineGetter__') | |
| 344 define_setter = self.cx.get_property(jsproto, | |
| 345 '__defineSetter__') | |
| 346 for name in pyproto.__jsprops__: | |
| 347 prop = getattr(pyproto, name) | |
| 348 if not type(prop) == property: | |
| 349 raise TypeError("Expected attribute '%s' to " | |
| 350 "be a property" % name) | |
| 351 getter = None | |
| 352 setter = None | |
| 353 if prop.fget: | |
| 354 getter = self.__wrap_pycallable(prop.fget, | |
| 355 pyproto) | |
| 356 if prop.fset: | |
| 357 setter = self.__wrap_pycallable(prop.fset, | |
| 358 pyproto) | |
| 359 if getter: | |
| 360 self.cx.call_function(jsproto, | |
| 361 define_getter, | |
| 362 (name, getter)) | |
| 363 if setter: | |
| 364 self.cx.call_function(jsproto, | |
| 365 define_setter, | |
| 366 (name, setter,)) | |
| 367 for name in dir(pyproto): | |
| 368 attr = getattr(pyproto, name) | |
| 369 if (isinstance(attr, types.UnboundMethodType) and | |
| 370 hasattr(attr, '__jsexposed__') and | |
| 371 attr.__jsexposed__): | |
| 372 jsmethod = self.__wrap_pycallable(attr, pyproto) | |
| 373 self.cx.define_property(jsproto, name, jsmethod) | |
| 374 self.__type_protos[pyproto] = jsproto | |
| 375 return self.cx.new_object(value, self.__type_protos[pyproto]) | |
| 376 | |
| 377 def wrap_pyobject(self, value): | |
| 378 """ | |
| 379 Wraps the given Python object for export to untrusted JS. | |
| 380 | |
| 381 If the Python object isn't of a type that can be exposed to JS, | |
| 382 a TypeError is raised. | |
| 383 """ | |
| 384 | |
| 385 if (isinstance(value, (int, basestring, float, bool)) or | |
| 386 value is pydermonkey.undefined or | |
| 387 value is None): | |
| 388 return value | |
| 389 if isinstance(value, SafeJsObjectWrapper): | |
| 390 # It's already wrapped, just unwrap it. | |
| 391 return value.wrapped_jsobject | |
| 392 elif callable(value): | |
| 393 if not (hasattr(value, '__jsexposed__') and | |
| 394 value.__jsexposed__): | |
| 395 raise ValueError("Callable isn't configured for exposure " | |
| 396 "to untrusted JS code") | |
| 397 return self.__wrap_pycallable(value) | |
| 398 elif isinstance(value, JsExposedObject): | |
| 399 return self.__wrap_pyinstance(value) | |
| 400 else: | |
| 401 raise TypeError("Can't expose objects of type '%s' to JS." % | |
| 402 type(value).__name__) | |
| 403 | |
| 404 def wrap_jsobject(self, jsvalue, this=None): | |
| 405 """ | |
| 406 Wraps the given pydermonkey.Object for import to trusted | |
| 407 Python code. If the type is just a primitive, it's simply | |
| 408 returned, since no wrapping is needed. | |
| 409 """ | |
| 410 | |
| 411 if this is None: | |
| 412 this = self.root.wrapped_jsobject | |
| 413 if isinstance(jsvalue, pydermonkey.Function): | |
| 414 if jsvalue.is_python: | |
| 415 # It's a Python function, just unwrap it. | |
| 416 return self.cx.get_object_private(jsvalue).wrapped_pyobject | |
| 417 return SafeJsFunctionWrapper(self, jsvalue, this) | |
| 418 elif isinstance(jsvalue, pydermonkey.Object): | |
| 419 # It's a wrapped Python object instance, just unwrap it. | |
| 420 instance = self.cx.get_object_private(jsvalue) | |
| 421 if instance: | |
| 422 if not isinstance(instance, JsExposedObject): | |
| 423 raise AssertionError("Object private is not of type " | |
| 424 "JsExposedObject") | |
| 425 return instance | |
| 426 else: | |
| 427 return SafeJsObjectWrapper(self, jsvalue, this) | |
| 428 else: | |
| 429 # It's a primitive value. | |
| 430 return jsvalue | |
| 431 | |
| 432 def new_array(self, *contents): | |
| 433 array = self.wrap_jsobject(self.cx.new_array_object()) | |
| 434 for item in contents: | |
| 435 array.push(item) | |
| 436 return array | |
| 437 | |
| 438 def new_object(self, **contents): | |
| 439 obj = self.wrap_jsobject(self.cx.new_object()) | |
| 440 for name in contents: | |
| 441 obj[name] = contents[name] | |
| 442 return obj | |
| 443 | |
| 444 def evaluate(self, code, filename='<string>', lineno=1): | |
| 445 retval = self.cx.evaluate_script(self.root.wrapped_jsobject, | |
| 446 code, filename, lineno) | |
| 447 return self.wrap_jsobject(retval) | |
| 448 | |
| 449 def run_script(self, filename, callback=None): | |
| 450 """ | |
| 451 Runs the given JS script, returning 0 on success, -1 on failure. | |
| 452 """ | |
| 453 | |
| 454 retval = -1 | |
| 455 contents = open(filename).read() | |
| 456 cx = self.cx | |
| 457 try: | |
| 458 result = cx.evaluate_script(self.root.wrapped_jsobject, | |
| 459 contents, filename, 1) | |
| 460 if callback: | |
| 461 callback(self.wrap_jsobject(result)) | |
| 462 retval = 0 | |
| 463 except pydermonkey.error, e: | |
| 464 print format_stack(self.js_stack) | |
| 465 print e.args[1] | |
| 466 except InternalError, e: | |
| 467 print "An internal error occurred." | |
| 468 traceback.print_tb(e.exc_info[2]) | |
| 469 print e.exc_info[1] | |
| 470 return retval | |
|
1
ab09b8a10876
Added trivial half-baked implementation of securable modules.
Atul Varma <varmaa@toolness.com>
parents:
0
diff
changeset
|
471 |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
472 class SecurableModuleLoader(object): |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
473 def __init__(self, sandbox, root_dir, globals): |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
474 self.root_dir = root_dir |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
475 self.sandbox = sandbox |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
476 self.globals = globals |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
477 self.modules = {} |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
478 self._install_globals(sandbox.root) |
|
2
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
479 |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
480 def _install_globals(self, object): |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
481 for name in self.globals: |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
482 object[name] = self.globals[name] |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
483 object['require'] = self.require |
|
1
ab09b8a10876
Added trivial half-baked implementation of securable modules.
Atul Varma <varmaa@toolness.com>
parents:
0
diff
changeset
|
484 |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
485 def _get_calling_script(self): |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
486 frame = self.sandbox.cx.get_stack()['caller'] |
|
2
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
487 curr_script = None |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
488 while frame and curr_script is None: |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
489 if frame['function'] and frame['function'].filename: |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
490 curr_script = frame['function'].filename |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
491 elif frame['script']: |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
492 curr_script = frame['script'].filename |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
493 frame = frame['caller'] |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
494 |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
495 if curr_script is None: |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
496 raise RuntimeError("Can't find calling script") |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
497 return curr_script |
|
2
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
498 |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
499 def _load_module(self, filename): |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
500 sandbox = self.sandbox |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
501 cx = sandbox.cx |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
502 |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
503 module = cx.new_object(None, sandbox.root_proto) |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
504 cx.init_standard_classes(module) |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
505 exports = cx.new_object() |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
506 cx.define_property(module, 'exports', exports) |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
507 self._install_globals(sandbox.wrap_jsobject(module)) |
|
4
ae5869491e61
Added more to securablemodule impl.
Atul Varma <varmaa@toolness.com>
parents:
3
diff
changeset
|
508 self.modules[filename] = sandbox.wrap_jsobject(exports) |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
509 |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
510 contents = open(filename).read() |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
511 cx.evaluate_script(module, contents, filename, 1) |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
512 |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
513 @jsexposed |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
514 def require(self, path): |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
515 curr_script = self._get_calling_script() |
|
2
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
516 curr_dir = os.path.split(curr_script)[0] |
|
1
ab09b8a10876
Added trivial half-baked implementation of securable modules.
Atul Varma <varmaa@toolness.com>
parents:
0
diff
changeset
|
517 |
|
4
ae5869491e61
Added more to securablemodule impl.
Atul Varma <varmaa@toolness.com>
parents:
3
diff
changeset
|
518 if not curr_dir.startswith(self.root_dir): |
|
ae5869491e61
Added more to securablemodule impl.
Atul Varma <varmaa@toolness.com>
parents:
3
diff
changeset
|
519 curr_dir = self.root_dir |
|
ae5869491e61
Added more to securablemodule impl.
Atul Varma <varmaa@toolness.com>
parents:
3
diff
changeset
|
520 filename = os.path.join(curr_dir, "%s.js" % path) |
|
2
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
521 filename = os.path.normpath(filename) |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
522 if (not filename.startswith(self.root_dir) or |
|
2
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
523 not (os.path.exists(filename) and |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
524 not os.path.isdir(filename))): |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
525 raise pydermonkey.error('Module not found: %s' % path) |
|
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
526 |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
527 if filename not in self.modules: |
|
4
ae5869491e61
Added more to securablemodule impl.
Atul Varma <varmaa@toolness.com>
parents:
3
diff
changeset
|
528 self._load_module(filename) |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
529 return self.modules[filename] |
|
2
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
530 |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
531 if __name__ == '__main__': |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
532 import os |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
533 sandbox = JsSandbox() |
|
2
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
534 |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
535 @jsexposed(name='print') |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
536 def jsprint(string): |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
537 print string |
|
2
b6f9d743a2b5
Refined require() implementation.
Atul Varma <varmaa@toolness.com>
parents:
1
diff
changeset
|
538 |
|
3
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
539 globals = {'print': jsprint} |
|
14d8d73774d7
Refactored securable module loader.
Atul Varma <varmaa@toolness.com>
parents:
2
diff
changeset
|
540 loader = SecurableModuleLoader(sandbox, "modules", globals) |
|
1
ab09b8a10876
Added trivial half-baked implementation of securable modules.
Atul Varma <varmaa@toolness.com>
parents:
0
diff
changeset
|
541 sandbox.run_script('test.js') |
|
ab09b8a10876
Added trivial half-baked implementation of securable modules.
Atul Varma <varmaa@toolness.com>
parents:
0
diff
changeset
|
542 sandbox.finish() |
