Plan 9 from Bell Labs’s /usr/web/sources/contrib/stallion/root/sys/lib/python2.7/CGIHTTPServer.pyc

Copyright © 2021 Plan 9 Foundation.
Distributed under the MIT License.
Download the Plan 9 distribution.


�`^c@s�dZdZdgZddlZddlZddlZddlZddlZddlZddl	Z	dej
fd��YZd�Ze
ad�Zd�Zeejd	�Zed
kr�e�ndS(s�CGI-savvy HTTP Server.

This module builds on SimpleHTTPServer by implementing GET and POST
requests to cgi-bin scripts.

If the os.fork() function is not present (e.g. on Windows),
os.popen2() is used as a fallback, with slightly altered semantics; if
that function is not present either (e.g. on Macintosh), only Python
scripts are supported, and they are executed by the current process.

In all cases, the implementation is intentionally naive -- all
requests are executed sychronously.

SECURITY WARNING: DON'T USE THIS CODE UNLESS YOU ARE INSIDE A FIREWALL
-- it may execute arbitrary Python code or external programs.

Note that status code 200 is sent prior to execution of a CGI script, so
scripts cannot send other status codes such as 302 (redirect).
s0.4tCGIHTTPRequestHandleri�NcBs�eZdZeed�Zeed�Zeed�ZdZd�Z	d�Z
d�Zdd	gZd
�Z
d�Zd�ZRS(
s�Complete HTTP server with GET, HEAD and POST commands.

    GET and HEAD also support running CGI scripts.

    The POST command is *only* implemented for CGI scripts.

    tforktpopen2tpopen3icCs-|j�r|j�n|jdd�dS(sRServe a POST request.

        This is only implemented for CGI scripts.

        i�sCan only POST to CGI scriptsN(tis_cgitrun_cgit
send_error(tself((s#/sys/lib/python2.7/CGIHTTPServer.pytdo_POST6s
cCs*|j�r|j�Stjj|�SdS(s-Version of send_head that support CGI scriptsN(RRtSimpleHTTPServertSimpleHTTPRequestHandlert	send_head(R((s#/sys/lib/python2.7/CGIHTTPServer.pyRBs
cCsittj|j��}|jdd�}|| ||d}}||jkre||f|_tStS(s2Test whether self.path corresponds to a CGI script.

        Returns True and updates the cgi_info attribute to the tuple
        (dir, rest) if self.path requires running a CGI script.
        Returns False otherwise.

        If any exception is raised, the caller should assume that
        self.path was rejected as invalid and act accordingly.

        The default implementation tests whether the normalized url
        path begins with one of the strings in self.cgi_directories
        (and the next character is a '/' or the end of the string).
        t/i(	t_url_collapse_pathturllibtunquotetpathtfindtcgi_directoriestcgi_infotTruetFalse(Rtcollapsed_pathtdir_septheadttail((s#/sys/lib/python2.7/CGIHTTPServer.pyRIss/cgi-bins/htbincCs
t|�S(s1Test whether argument path is an executable file.(t
executable(RR((s#/sys/lib/python2.7/CGIHTTPServer.pyt
is_executableascCs(tjj|�\}}|j�dkS(s.Test whether argument path is a Python script.s.pys.pyw(s.pys.pyw(tosRtsplitexttlower(RRRR((s#/sys/lib/python2.7/CGIHTTPServer.pyt	is_pythonesc'
Cs�|j\}}|jd�}xi|dkr�|| }||d}|j|�}tjj|�r�||}}|jd�}q!Pq!W|jd�}|dkr�|| ||d}}nd}|jd�}|dkr�| ||}}n
|d}}|d|}	|j|	�}
tjj|
�sN|jdd|	�dStjj	|
�sx|jd	d
|	�dS|j
|	�}|s�jp�|jp�|j
s�|jd	d|	�dS|j|
�s�jd	d|	�dSntjtj�}|j�|d
<|jj|d<d|d<|j|d<t|jj�|d<|j|d<tj|�}
|
|d<|j|
�|d<|	|d<|r�||d<n|j�}||jdkr�||d<n|jd|d<|jjd�}|r�|j�}t |�dkr�ddl!}ddl"}|d|d<|dj#�dkr�y|j$|d�}Wn|j%k
r{q�X|jd�}t |�dkr�|d|d <q�q�q�n|jj&dkr�|jj(|d!<n|jj&|d!<|jjd"�}|r||d#<n|jjd$�}|r6||d%<ng}xW|jj)d&�D]C}|d d'kr{|j*|j+��qO||d(jd)�}qOWd)j,|�|d*<|jjd+�}|r�||d,<nt-d|jj.d-��}|rd.j,|�|d/<nxdCD]}|j/|d�qW|j0d0d1�|j1d2d3�}|jr�|g}d4|krv|j*|�nt2�}|j3j4�tj5�}|dkrtj6|d�\}}x<t7j7|j8gggd�dr�j8j9d�s�Pq�q�W|r|j:d5|�ndSyqytj;|�Wntj<k
rBnXtj=|j8j>�d�tj=|j3j>�d�tj?|
||�Wq�|jj@|jA|j�tjBd6�q�XnddlC}|
g}|j
|
�r&tDjE} | j#�jFd7�r| d8 | d9} n| d:g|}nd4|krB|j*|�n|jGd;|jH|��ytI|�}!WntJtKfk
r�d}!nX|jL|d<|jMd=|jMd>|jMd?|�}"|jj#�d@kr�dkr�j8j9|!�}#nd}#xBt7j7|j8jNgggd�dr;|j8jNjOd�s��W|"jP|#�\}$}%|j3jQ|$�|%rz|j:dA|%�n|"jRjS�|"jTjS�|"jU}&|&r�|j:d5|&�n
|jGdB�dS(DsExecute a CGI script.Riit?ti�sNo such CGI script (%r)Ni�s#CGI script is not a plain file (%r)s&CGI script is not a Python script (%r)s!CGI script is not executable (%r)tSERVER_SOFTWAREtSERVER_NAMEsCGI/1.1tGATEWAY_INTERFACEtSERVER_PROTOCOLtSERVER_PORTtREQUEST_METHODt	PATH_INFOtPATH_TRANSLATEDtSCRIPT_NAMEtQUERY_STRINGtREMOTE_HOSTtREMOTE_ADDRt
authorizationii�t	AUTH_TYPEtbasict:tREMOTE_USERtCONTENT_TYPEscontent-lengthtCONTENT_LENGTHtreferertHTTP_REFERERtaccepts	

 it,tHTTP_ACCEPTs
user-agenttHTTP_USER_AGENTtcookies, tHTTP_COOKIEi�sScript output followst+t t=sCGI script exit status %#xisw.exei�i�s-uscommand: %ststdintstdouttstderrtenvtposts%ssCGI script exited OK(R+R,R4R:R<R6(VRRttranslate_pathRRtisdirtrfindtexistsRtisfileRt	have_forkthave_popen2thave_popen3Rtcopytdeepcopytenvirontversion_stringtservertserver_nametprotocol_versiontstrtserver_porttcommandRRtaddress_stringtclient_addresstheaderst	getheadertsplittlentbase64tbinasciiRtdecodestringtErrort
typeheadertNonettypetgetallmatchingheaderstappendtstriptjointfiltert
getheaderst
setdefaultt
send_responsetreplacet
nobody_uidtwfiletflushRtwaitpidtselecttrfiletreadt	log_errortsetuidterrortdup2tfilenotexecvethandle_errortrequestt_exitt
subprocesstsysRtendswithtlog_messagetlist2cmdlinetintt	TypeErrort
ValueErrortPopentPIPEt_socktrecvtcommunicatetwriteRBtcloseRAt
returncode('Rtdirtresttitnextdirtnextrestt	scriptdirtquerytscriptt
scriptnamet
scriptfiletispyRCtuqrestthostR.R]R^tlengthR5R7tlinetuatcotkt
decoded_querytargstnobodytpidtstsR}tcmdlinetinterptnbytestptdataRARBtstatus((s#/sys/lib/python2.7/CGIHTTPServer.pyRjs6













			
%		
				!(

	(t__name__t
__module__t__doc__thasattrRRJRKRLtrbufsizeRRRRRRR(((s#/sys/lib/python2.7/CGIHTTPServer.pyR#s					cCs�|jd�}g}xM|d D]A}|dkr?|j�q |r |dkr |j|�q q W|r�|j�}|r�|dkr�|j�d}q�|dkr�d}q�q�nd}ddj|�|f}dj|�}|S(s`
    Given a URL path, remove extra '/'s and '.' path elements and collapse
    any '..' references and returns a colllapsed path.

    Implements something akin to RFC-2396 5.2 step 6 to parse relative paths.
    The utility of this function is limited to is_cgi method and helps
    preventing some security attacks.

    Returns: A tuple of (head, tail) where tail is everything after the final /
    and head is everything before it.  Head will always start with a '/' and,
    if it contains anything else, never have a trailing '/'.

    Raises: IndexError if too many '..' occur within the path.

    Ri�s..t.R!(R[tpopReRg(Rt
path_partst
head_partstpartt	tail_partt	splitpathR((s#/sys/lib/python2.7/CGIHTTPServer.pyR
.s&

	cCs�tr
tSyddl}Wntk
r.dSXy|jd�daWn3tk
r{dttd�|j���anXtS(s$Internal routine to get nobody's uidi�NR�iicSs|dS(Ni((tx((s#/sys/lib/python2.7/CGIHTTPServer.pyt<lambda>fs(R�tpwdtImportErrortgetpwnamtKeyErrortmaxtmaptgetpwall(R�((s#/sys/lib/python2.7/CGIHTTPServer.pyRmZs

&cCs<ytj|�}Wntjk
r*tSX|jd@dkS(sTest for executable file.iIi(RtstatRvRtst_mode(Rtst((s#/sys/lib/python2.7/CGIHTTPServer.pyRjs
cCstj||�dS(N(R	ttest(tHandlerClasstServerClass((s#/sys/lib/python2.7/CGIHTTPServer.pyR�sst__main__(R�t__version__t__all__RR~RtBaseHTTPServerR	RqRMR
RR
RbR�RmRt
HTTPServerR�R�(((s#/sys/lib/python2.7/CGIHTTPServer.pyt<module>s&	�*			

Bell Labs OSI certified Powered by Plan 9

(Return to Plan 9 Home Page)

Copyright © 2021 Plan 9 Foundation. All Rights Reserved.
Comments to [email protected].