Hello,<br><br>Thank you for your answer Dieter.<br><br>Indeed, I have been looking in all the restricted interpreter things.<br>I have been reading zope\security\untristedinterpreter.txt, and I think it is probably what I need.
<br>The thing is I don't know how to produce a security proxy which would allow any 'get' access and forbide any 'set' access.<br><br>I understand I have to use ProxyFactory, but I don't understand how I can configure my own Checker that would grant the access policy I want.
<br><br>If anybody have some knowledge about it, any help would be appreciated.<br><br>Thanks<br><br><div><span class="gmail_quote">On 3/6/07, <b class="gmail_sendername">Dieter Maurer</b> <<a href="mailto:dieter@handshake.de">
dieter@handshake.de</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">Eric Bréhault wrote at 2007-3-5 13:14 +0100:<br>>I have build a Plone product which allows users to enter a piece of Python
<br>>code.<br>>This way, users can easily define their own actions without changing the<br>>product source code.<br>><br>>Those pieces of code are executed using the exec Python command.<br><br>I would instead use TALES expressions of type python.
<br><br>There are restricted -- which is very essential if you cannot<br>fully trust your users.<br><br><br><br>--<br>Dieter<br></blockquote></div><br>