uawdijnntqw1x1x1
IP : 18.226.163.98
Hostname : ns1.eurodns.top
Kernel : Linux ns1.eurodns.top 4.18.0-553.5.1.lve.1.el7h.x86_64 #1 SMP Fri Jun 14 14:24:52 UTC 2024 x86_64
Disable Function : mail,sendmail,exec,passthru,shell_exec,system,popen,curl_multi_exec,show_source,eval,open_base
OS : Linux
PATH:
/
home
/
..
/
lib
/
python2.7
/
site-packages
/
rhn
/
..
/
jinja2
/
sandbox.pyo
/
/
� ��\c@s8dZddlZddlZddlmZddlmZddlmZddl m Z mZmZm Z mZmZmZmZmZddlmZeZeed�r�dd lmZeZnd Zeddd ddg�Zedddg�Zeddg�Zeddg�Z eddg�Z!esJe�Znddl"Z"e"j#dde$dd�ddlm%Z%efZ&e'fZ(e)fZ*yGddl+m+Z+m,Z,ddl-m-Z-e(e+e,f7Z(e&e-f7Z&Wne.k r�nXy!dd l/m0Z0e&e0f7Z&Wne.k r)nXyGdd!lm1Z1m2Z2m3Z3e&e1f7Z&e(e2f7Z(e*e3f7Z*Wne.k r�nXe&e4d"d#d$d%d&d'd(d)g�fe(e4d#d&d*d+d)g�fe*e4d,d-d.d/d0d'g�fe%e4d,d1d#d0d2d&d3d'd4g �ffZ5eed�rCd5efd6��YZ6nd7efd8��YZ7d9�Z8d:�Z9d;�Z:d<�Z;d=�Z<d>efd?��YZ=d@e=fdA��YZ>er4yddBl?m@Z@Wne.k r�dC�Z@nXdDeAfdE��YZBdFeBefdG��YZCdHeBe6fdI��YZDndS(Jsj jinja2.sandbox ~~~~~~~~~~~~~~ Adds a sandbox layer to Jinja as it was the default behavior in the old Jinja 1 releases. This sandbox is slightly different from Jinja 1 as the default behavior is easier to use. The behavior can be changed by subclassing the environment. :copyright: (c) 2010 by the Jinja Team. :license: BSD. i����N(tMapping(tEnvironment(t SecurityError( tstring_typest function_typetmethod_typettraceback_typet code_typet frame_typetgenerator_typet text_typetPY2(tMarkuptformat(t Formatteri��tfunc_closuret func_codet func_dictt func_defaultstfunc_globalstim_classtim_functim_selftgi_frametgi_codetcr_frametcr_codetag_codetag_frametignoresthe sets moduletmodulesjinja2.sandbox(tdeque(tUserDictt DictMixin(tUserList(tSet(t MutableSettMutableMappingtMutableSequencetaddtcleartdifference_updatetdiscardtpoptremovetsymmetric_difference_updatetupdatetpopitemt setdefaulttappendtreversetinserttsorttextendt appendleftt extendlefttpoplefttrotatetEscapeFormattercBseZd�Zd�ZRS(cCs ||_dS(N(tescape(tselfR;((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyt__init__tscCs�t|d�r!|j|�}n`t|d�rf|rWtdj|t|����n|j�}ntj||t|��}t|j |��S(Nt__html_format__t__html__s�Format specifier {0} given, but {1} does not define __html_format__. A class that defines __html__ must define __html_format__ to work with format specifiers.( thasattrR>t ValueErrorR ttypeR?Rtformat_fieldR R;(R<tvaluetformat_spectrv((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyRCws(t__name__t __module__R=RC(((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR:ss t_MagicFormatMappingcBs2eZdZd�Zd�Zd�Zd�ZRS(s�This class implements a dummy wrapper to fix a bug in the Python standard library for string formatting. See http://bugs.python.org/issue13598 for information about why this is necessary. cCs||_||_d|_dS(Ni(t_argst_kwargst_last_index(R<targstkwargs((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR=�s cCsa|dkrV|j}|jd7_y|j|SWntk rFnXt|�}n|j|S(Nti(RLRJtLookupErrortstrRK(R<tkeytidx((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyt__getitem__�s cCs t|j�S(N(titerRK(R<((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyt__iter__�scCs t|j�S(N(tlenRK(R<((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyt__len__�s(RGRHt__doc__R=RTRVRX(((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyRI�s cCsYts dSt|tjtjf�s5|jdkr9dS|j}t|t�rU|SdS(NR ( t has_formattNonet isinstancettypest MethodTypetBuiltinMethodTypeRGt__self__R(tcallabletobj((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pytinspect_format_method�s cGs5t|�}t|�tkr1tdt��n|S(sWA range that can't generate ranges with a length of more than MAX_RANGE items. s+range too big, maximum size for range is %d(trangeRWt MAX_RANGEt OverflowError(RMtrng((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyt safe_range�s cCs t|_|S(snMarks a function or method as unsafe. :: @unsafe def delete(self): pass (tTruetunsafe_callable(tf((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pytunsafe�s cCs%t|t�r"|tkrtSn�t|t�rP|tksI|tkrtSn�t|t�rr|dkrtSn�t|ttt f�r�tSt|t �r�|tkrtSnhtt d�r�t|t j�r�|tkrtSn4tt d�rt|t j�rttkrtSn|jd�S(s Test if the attribute given is an internal python attribute. For example this function returns `True` for the `func_code` attribute of python objects. This is useful if the environment method :meth:`~SandboxedEnvironment.is_safe_attribute` is overridden. >>> from jinja2.sandbox import is_internal_attribute >>> is_internal_attribute(lambda: None, "func_code") True >>> is_internal_attribute((lambda x:x).func_code, 'co_code') True >>> is_internal_attribute(str, "upper") False tmrot CoroutineTypetAsyncGeneratorTypet__(R\RtUNSAFE_FUNCTION_ATTRIBUTESRiRtUNSAFE_METHOD_ATTRIBUTESRBRRRR tUNSAFE_GENERATOR_ATTRIBUTESR@R]RntUNSAFE_COROUTINE_ATTRIBUTESRotattrit!UNSAFE_ASYNC_GENERATOR_ATTRIBUTESt startswith(Rbtattr((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pytis_internal_attribute�s,!!cCs4x-tD]%\}}t||�r||kSqWtS(s�This function checks if an attribute on a builtin mutable object (list, dict, set or deque) would modify it if called. It also supports the "user"-versions of the objects (`sets.Set`, `UserDict.*` etc.) and with Python 2.6 onwards the abstract base classes `MutableSet`, `MutableMapping`, and `MutableSequence`. >>> modifies_known_mutable({}, "clear") True >>> modifies_known_mutable({}, "keys") False >>> modifies_known_mutable([], "append") True >>> modifies_known_mutable([], "index") False If called with an unsupported object (such as unicode) `False` is returned. >>> modifies_known_mutable("foo", "upper") False (t _mutable_specR\tFalse(RbRxttypespecRl((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pytmodifies_known_mutable�stSandboxedEnvironmentcBs�eZdZeZiejd6ejd6ejd6ej d6ej d6ejd6ejd6Z iejd6ejd6Ze�Ze�Zd�Zd �Zd �Zd�Zd�Zd �Zd�Zd�Zd�Zd�Zd�ZRS(s�The sandboxed environment. It works like the regular environment but tells the compiler to generate sandboxed code. Additionally subclasses of this environment may override the methods that tell the runtime what attributes or functions are safe to access. If the template tries to access insecure code a :exc:`SecurityError` is raised. However also other exceptions may occur during the rendering so the caller has to ensure that all exceptions are caught. t+t-t*t/s//s**t%cCstS(s�Called during template compilation with the name of a unary operator to check if it should be intercepted at runtime. If this method returns `True`, :meth:`call_unop` is excuted for this unary operator. The default implementation of :meth:`call_unop` will use the :attr:`unop_table` dictionary to perform the operator with the same logic as the builtin one. The following unary operators are interceptable: ``+`` and ``-`` Intercepted calls are always slower than the native operator call, so make sure only to intercept the ones you are interested in. .. versionadded:: 2.6 (R{(R<toperator((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pytintercept_unopPscOsHtj|||�t|jd<|jj�|_|jj�|_dS(NRd( RR=Rhtglobalstdefault_binop_tabletcopytbinop_tabletdefault_unop_tablet unop_table(R<RMRN((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR=bs cCs|jd�pt||�S(sYThe sandboxed environment will call this method to check if the attribute of an object is safe to access. Per default all attributes starting with an underscore are considered private as well as the special attributes of internal python objects as returned by the :func:`is_internal_attribute` function. t_(RwRy(R<RbRxRD((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pytis_safe_attributehscCs#t|dt�p!t|dt�S(sCheck if an object is safely callable. Per default a function is considered safe unless the `unsafe_callable` attribute exists and is True. Override this method to alter the behavior, but this won't affect the `unsafe` decorator from this module. Rjtalters_data(tgetattrR{(R<Rb((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pytis_safe_callableqscCs|j|||�S(s�For intercepted binary operator calls (:meth:`intercepted_binops`) this function is executed instead of the builtin operator. This can be used to fine tune the behavior of certain operators. .. versionadded:: 2.6 (R�(R<tcontextR�tlefttright((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyt call_binopzscCs|j||�S(s�For intercepted unary operator calls (:meth:`intercepted_unops`) this function is executed instead of the builtin operator. This can be used to fine tune the behavior of certain operators. .. versionadded:: 2.6 (R�(R<R�R�targ((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyt call_unop�scCs�y||SWn�ttfk r�t|t�r�yt|�}Wntk rTq�Xyt||�}Wntk r{q�X|j|||�r�|S|j ||�Sq�nX|j d|d|�S(s(Subscribe an object from sandboxed code.Rbtname(t TypeErrorRPR\RRQt ExceptionR�tAttributeErrorR�tunsafe_undefinedt undefined(R<RbtargumentRxRD((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pytgetitem�s cCs�yt||�}Wn7tk rLy||SWqvttfk rHqvXn*X|j|||�rf|S|j||�S|jd|d|�S(s�Subscribe an object from sandboxed code and prefer the attribute. The attribute passed *must* be a bytestring. RbR�(R�R�R�RPR�R�R�(R<Rbt attributeRD((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR��s cCs/|jd||jjfd|d|dt�S(s1Return an undefined object for unsafe attributes.s.access to attribute %r of %r object is unsafe.R�Rbtexc(R�t __class__RGR(R<RbR�((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR��s cCsdt|t�r$t||j�}nt|�}t||�}|j|||�}t|�|�S(s�If a format call is detected, then this is routed through this method so that our safety sandbox can be used for it. (R\RtSandboxedEscapeFormatterR;tSandboxedFormatterRItvformatRB(R<tsRMRNt formatterRF((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyt format_string�scOsct|�}|dk r+|j|||�S|j|�sPtd|f��n|j|||�S(s#Call an object from sandboxed code.s%r is not safely callableN(RcR[R�R�Rtcall(t_SandboxedEnvironment__selft_SandboxedEnvironment__contextt_SandboxedEnvironment__objRMRNtfmt((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR��s(RGRHRYRit sandboxedR�R'tsubtmulttruedivtfloordivtpowtmodR�tpostnegR�t frozensettintercepted_binopstintercepted_unopsR�R=R�R�R�R�R�R�R�R�R�(((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR~s4 tImmutableSandboxedEnvironmentcBseZdZd�ZRS(s�Works exactly like the regular `SandboxedEnvironment` but does not permit modifications on the builtin mutable objects `list`, `set`, and `dict` by using the :func:`modifies_known_mutable` function. cCs*tj||||�stSt||�S(N(R~R�R{R}(R<RbRxRD((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR��s(RGRHRYR�(((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR��s(tformatter_field_name_splitcCs |j�S(N(t_formatter_field_name_split(t field_name((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR��stSandboxedFormatterMixincBseZd�Zd�ZRS(cCs ||_dS(N(t_env(R<tenv((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR=�sc Cs{t|�\}}|j|||�}xG|D]?\}}|rX|jj||�}q.|jj||�}q.W||fS(N(R�t get_valueR�R�R�( R<R�RMRNtfirsttrestRbtis_attrti((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyt get_field�s(RGRHR=R�(((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR��s R�cBseZd�ZRS(cCs!tj||�tj|�dS(N(R�R=R(R<R�((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR=�s(RGRHR=(((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR��sR�cBseZd�ZRS(cCs$tj||�tj||�dS(N(R�R=R:(R<R�R;((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR=�s(RGRHR=(((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyR��s(ERYR]R�tcollectionsRtjinja2.environmentRtjinja2.exceptionsRtjinja2._compatRRRRRRR R Rtjinja2.utilsRR{RZR@tstringRRiRetsetRqRrRsRtRvtwarningstfilterwarningstDeprecationWarningRt_mutable_set_typestdictt_mutable_mapping_typestlistt_mutable_sequence_typesR R!R"tImportErrortsetsR#R$R%R&R�RzR:RIRcRhRlRyR}R~R�t_stringR�tobjectR�R�R�(((s2/usr/lib/python2.7/site-packages/jinja2/sandbox.pyt<module>s�@ & �
/home/../lib/python2.7/site-packages/rhn/../jinja2/sandbox.pyo