blob: 55936ac6021e67228c784ae5e930e9d9323ab85b [file] [log] [blame]
Guido van Rossumc3d090c1996-10-22 01:10:56 +00001\chapter{Restricted Execution}
Fred Drake31ecd501998-02-18 15:40:11 +00002\label{restricted}
Guido van Rossumc3d090c1996-10-22 01:10:56 +00003
Guido van Rossumf73f79b1996-10-24 22:14:06 +00004In general, Python programs have complete access to the underlying
5operating system throug the various functions and classes, For
6example, a Python program can open any file for reading and writing by
7using the \code{open()} built-in function (provided the underlying OS
8gives you permission!). This is exactly what you want for most
9applications.
Guido van Rossumc3d090c1996-10-22 01:10:56 +000010
Guido van Rossumf73f79b1996-10-24 22:14:06 +000011There exists a class of applications for which this ``openness'' is
12inappropriate. Take Grail: a web browser that accepts ``applets'',
13snippets of Python code, from anywhere on the Internet for execution
14on the local system. This can be used to improve the user interface
15of forms, for instance. Since the originator of the code is unknown,
16it is obvious that it cannot be trusted with the full resources of the
17local machine.
Guido van Rossumc3d090c1996-10-22 01:10:56 +000018
Guido van Rossumf73f79b1996-10-24 22:14:06 +000019\emph{Restricted execution} is the basic framework in Python that allows
Guido van Rossumc3d090c1996-10-22 01:10:56 +000020for the segregation of trusted and untrusted code. It is based on the
21notion that trusted Python code (a \emph{supervisor}) can create a
Guido van Rossumf73f79b1996-10-24 22:14:06 +000022``padded cell' (or environment) with limited permissions, and run the
Guido van Rossumc3d090c1996-10-22 01:10:56 +000023untrusted code within this cell. The untrusted code cannot break out
24of its cell, and can only interact with sensitive system resources
Guido van Rossumf73f79b1996-10-24 22:14:06 +000025through interfaces defined and managed by the trusted code. The term
26``restricted execution'' is favored over ``safe-Python''
Guido van Rossumc3d090c1996-10-22 01:10:56 +000027since true safety is hard to define, and is determined by the way the
28restricted environment is created. Note that the restricted
29environments can be nested, with inner cells creating subcells of
Guido van Rossumf73f79b1996-10-24 22:14:06 +000030lesser, but never greater, privilege.
Guido van Rossumc3d090c1996-10-22 01:10:56 +000031
32An interesting aspect of Python's restricted execution model is that
Guido van Rossumf73f79b1996-10-24 22:14:06 +000033the interfaces presented to untrusted code usually have the same names
Guido van Rossumc3d090c1996-10-22 01:10:56 +000034as those presented to trusted code. Therefore no special interfaces
35need to be learned to write code designed to run in a restricted
36environment. And because the exact nature of the padded cell is
37determined by the supervisor, different restrictions can be imposed,
38depending on the application. For example, it might be deemed
39``safe'' for untrusted code to read any file within a specified
40directory, but never to write a file. In this case, the supervisor
41may redefine the built-in
42\code{open()} function so that it raises an exception whenever the
43\var{mode} parameter is \code{'w'}. It might also perform a
44\code{chroot()}-like operation on the \var{filename} parameter, such
45that root is always relative to some safe ``sandbox'' area of the
46filesystem. In this case, the untrusted code would still see an
Guido van Rossumf73f79b1996-10-24 22:14:06 +000047built-in \code{open()} function in its environment, with the same
Guido van Rossumc3d090c1996-10-22 01:10:56 +000048calling interface. The semantics would be identical too, with
49\code{IOError}s being raised when the supervisor determined that an
50unallowable parameter is being used.
51
Guido van Rossumf73f79b1996-10-24 22:14:06 +000052The Python run-time determines whether a particular code block is
53executing in restricted execution mode based on the identity of the
54\code{__builtins__} object in its global variables: if this is (the
55dictionary of) the standard \code{__builtin__} module, the code is
56deemed to be unrestricted, else it is deemed to be restricted.
57
58Python code executing in restricted mode faces a number of limitations
59that are designed to prevent it from escaping from the padded cell.
60For instance, the function object attribute \code{func_globals} and the
61class and instance object attribute \code{__dict__} are unavailable.
62
Guido van Rossumc3d090c1996-10-22 01:10:56 +000063Two modules provide the framework for setting up restricted execution
64environments:
65
66\begin{description}
67
68\item[rexec]
69--- Basic restricted execution framework.
70
71\item[Bastion]
72--- Providing restricted access to objects.
73
74\end{description}