home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.lang.tcl
- Path: sparky!uunet!hobbes!markd
- From: markd@sco.COM (Mark Diekhans)
- Subject: Re: How difficult is a restricted tcl shell ?
- Organization: The Santa Cruz Operation, Inc.
- Date: Fri, 22 Jan 1993 19:33:03 GMT
- Message-ID: <1993Jan22.193303.28724@sco.com>
- Keywords: shell user supervisor interpreter
- References: <brucet.727682251@extro.ucc.su.OZ.AU>
- Sender: news@sco.com (News admin)
- Lines: 14
-
-
- In article <brucet.727682251@extro.ucc.su.OZ.AU> brucet@extro.ucc.su.OZ.AU (Bruce Tulloch) writes:
-
-
- >However, I have a similar need, if not purpose. My interest is how
- >best to protect certain built-in commands as well procedures so that
- >naive users can be protected from touching the "wrong button" when
- >given access to a tcl shell within an application.
-
- This could be done with the Tcl command tracing facility if it was enhanced
- so that a trace function to return an error. This would allow a trace
- to reject a certain set of commands, or even commands with certain arguments.
-
- Mark
-