[prev in list] [next in list] [prev in thread] [next in thread] 

List:       squeak-vm-dev
Subject:    [Vm-dev] Compiler evaluate: - How to only allow access to given classes or capabilities?
From:       "phil () highoctane ! be" <phil () highoctane ! be>
Date:       2014-10-26 6:55:20
Message-ID: CAMynPtyKQys96SGvkU2RhueRb0Oh43QyS6fYTTMSiNVCzsdisQ () mail ! gmail ! com
[Download RAW message or body]

[Attachment #3 (multipart/alternative)]


"Compiler evaluate: source" is a powerful feature.

Now, how can I disallow "dangerous" calls from the source?

A bit like in java where we have the security manager.

http://www.securingjava.com/chapter-two/chapter-two-8.html

What do we have in stock?

To avoid things like a Smalltalk quitPrimitive ...


TIA
Phil

[Attachment #6 (text/html)]

<div dir="ltr"><div><div>&quot;Compiler evaluate: source&quot; is a powerful \
feature.</div></div><div><br></div><div>Now, how can I disallow &quot;dangerous&quot; \
calls from the source?</div><div><br></div><div>A bit like in java where we have the \
security manager.</div><div><br></div><div><a \
href="http://www.securingjava.com/chapter-two/chapter-two-8.html">http://www.securingjava.com/chapter-two/chapter-two-8.html</a><br></div><div><br></div><div>What \
do we have in stock?<br></div><div><br></div><div>To avoid things like a Smalltalk \
quitPrimitive ...<br><br></div><div><br></div><div>TIA</div><div>Phil</div> </div>



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic