It looks like Python might end up with a sandbox execution environment after all.

-------- Original Message --------
Return-Path: <[EMAIL PROTECTED]>
X-Original-To: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
Received: from laweleka.osafoundation.org (laweleka.osafoundation.org [204.152.186.98]) by leilani.osafoundation.org (Postfix) with ESMTP id D3CBC7F6E5 for <[EMAIL PROTECTED]>; Fri, 14 Apr 2006 06:37:39 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by laweleka.osafoundation.org (Postfix) with ESMTP id C5CAC142276 for <[EMAIL PROTECTED]>; Fri, 14 Apr 2006 06:37:39 -0700 (PDT)
Received: from laweleka.osafoundation.org ([127.0.0.1]) by localhost (laweleka.osafoundation.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 28859-06 for <[EMAIL PROTECTED]>; Fri, 14 Apr 2006 06:37:38 -0700 (PDT)
Received: from www.wingide.com (www.archaeopteryx.com [209.251.75.100]) by laweleka.osafoundation.org (Postfix) with ESMTP id 4856014226B for <[EMAIL PROTECTED]>; Fri, 14 Apr 2006 06:37:38 -0700 (PDT)
Received: from localhost (eagle.wingide.com [209.251.75.100]) by www.wingide.com (Postfix) with ESMTP id 5134213156A; Fri, 14 Apr 2006 10:49:44 -0400 (EDT)
Date: Fri, 14 Apr 2006 09:37:33 -0400 (EDT)
From: sdeibel <[EMAIL PROTECTED]>
X-X-Sender: [EMAIL PROTECTED]
To: John Anderson <[EMAIL PROTECTED]>
Cc: sdeibel <[EMAIL PROTECTED]>
Subject: Python 3000 restricted execution discussion
Message-ID: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-Virus-Scanned: by amavisd-new and clamav at osafoundation.org
X-Spam-Status: No, hits=-1.8 tagged_above=-50.0 required=4.0 tests=AWL, BAYES_00
X-Spam-Level:


Hi, John,

Have you seen the following thread on the new python-3000 mailing 
list?

http://mail.python.org/pipermail/python-3000/2006-April/thread.html#567

I remembered Mitch talking about this in his PyCon keynote and 
also found his blog mention of it:

http://blogs.osafoundation.org/mitch/000559.html

Is there possibly OSAF interest in this?  It seems like a good 
opportunity to try to get a real restricted execution capability
into Python 3000 (which is now under active development a no 
longer purely mythical in case you didn't know!)

Actually, from Mitch's blog it doesn't sound like this was really 
his own personal interest but it seemed worth emailing you in 
case it's of interest for Chandler longer-term.  It certainly 
would benefit anyone wanting to keep an app reasonably safe from 
malicious or accidental pollution from extension scripts written 
in Python.

Hope you're doing well!

Stephan Deibel

--
Wingware
Wing IDE for Python
Advancing Software Development

www.wingware.com
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

Open Source Applications Foundation "chandler-dev" mailing list
http://lists.osafoundation.org/mailman/listinfo/chandler-dev

Reply via email to