Sponsored Content
Full Discussion: Sandboxes for developers
Operating Systems Linux Debian Sandboxes for developers Post 302504410 by mark54g on Monday 14th of March 2011 01:43:44 PM
Old 03-14-2011
I'm in a similar boat, but I'm actually hoping for a budget for this.

My goal is to use VMware, Hyperic for monitoring, and Spacewalk (redhat shop, no RHN satellite).
 

3 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Honk if you love Solaris Developers!

Are you a developer for Solaris products? If so, check this out: http://sdc.sun.com/solaris8/ The media kit that comes includes the entire media pack (Solaris 8) for both Intel and Sparc architectures, and a cool spill-proof coffe mug (for those all-nighters you're going to pull playing with... (1 Reply)
Discussion started by: LivinFree
1 Replies

2. Android

Any Android Developers in the Forums?

I'm about to make the switch over to Android OS for my mobile phone. I'm thinking my first Android phone might be something like a Samsung Galaxy S or an HTC Desire HD, or I might wait for one of the new Android tablets coming out later this year (like the Samsung 7" tablet on Android). Was... (10 Replies)
Discussion started by: Neo
10 Replies

3. What is on Your Mind?

Dear Debian-Developers

As strolling along this thread, what is on my mind I am still quite upset about the security guidelines set by the developers of Debian or any distro based upon Debian. For a while I have been really blissed using squeeze. No trouble at all with almost nothing, but using wheezy trouble came up with... (9 Replies)
Discussion started by: 1in10
9 Replies
RUNKIT_SANDBOX_PARENT(3)						 1						  RUNKIT_SANDBOX_PARENT(3)

Runkit_Sandbox_Parent - Runkit Anti-Sandbox Class

SYNOPSIS
void Runkit_Sandbox_Parent::__construct (void ) DESCRIPTION
Instantiating the Runkit_Sandbox_Parent class from within a sandbox environment created from the Runkit_Sandbox class provides some (con- trolled) means for a sandbox child to access its parent. Note Sandbox support (required for runkit_lint(3), runkit_lint_file(3), and the Runkit_Sandbox class) is only available as of PHP 5.1.0 or specially patched versions of PHP 5.0, and requires that thread safety be enabled. See the README file included in the runkit package for more information. In order for any of the Runkit_Sandbox_Parent features to function. Support must be enabled on a per-sandbox basis by enabling the par- ent_access flag from the parent's context. Example #1 Working with variables in a sandbox <?php $sandbox = new Runkit_Sandbox(); $sandbox['parent_access'] = true; ?> ACCESSING THE PARENT'S VARIABLES Just as with sandbox variable access, a sandbox parent's variables may be read from and written to as properties of the Runkit_Sand- box_Parent class. Read access to parental variables may be enabled with the parent_read setting (in addition to the base parent_access set- ting). Write access, in turn, is enabled through the parent_write setting. Unlike sandbox child variable access, the variable scope is not limited to globals only. By setting the parent_scope setting to an appro- priate integer value, other scopes in the active call stack may be inspected instead. A value of 0 (Default) will direct variable access at the global scope. 1 will point variable access at whatever variable scope was active at the time the current block of sandbox code was exe- cuted. Higher values progress back through the functions that called the functions that led to the sandbox executing code that tried to access its own parent's variables. Example #2 Accessing parental variables <?php $php = new Runkit_Sandbox(); $php['parent_access'] = true; $php['parent_read'] = true; $test = "Global"; $php->eval('$PARENT = new Runkit_Sandbox_Parent;'); $php['parent_scope'] = 0; one(); $php['parent_scope'] = 1; one(); $php['parent_scope'] = 2; one(); $php['parent_scope'] = 3; one(); $php['parent_scope'] = 4; one(); $php['parent_scope'] = 5; one(); function one() { $test = "one()"; two(); } function two() { $test = "two()"; three(); } function three() { $test = "three()"; $GLOBALS['php']->eval('var_dump($PARENT->test);'); } ?> The above example will output: string(6) "Global" string(7) "three()" string(5) "two()" string(5) "one()" string(6) "Global" string(6) "Global" CALLING THE PARENT'S FUNCTIONS Just as with sandbox access, a sandbox may access its parents functions providing that the proper settings have been enabled. Enabling parent_call will allow the sandbox to call all functions available to the parent scope. Language constructs are each controlled by their own setting: print(3) and echo(3) are enabled with parent_echo. die(3) and exit(3) are enabled with parent_die. eval(3) is enabled with parent_eval while include(3), include_once(3), require(3), and require_once(3) are enabled through parent_include. PHP Documentation Group RUNKIT_SANDBOX_PARENT(3)
All times are GMT -4. The time now is 07:47 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy