blob: e244d6cbc18d11b0dfb4d3f19a62ee241d524882 [file] [log] [blame]
Benjamin Peterson90f5ba52010-03-11 22:53:45 +00001#! /usr/bin/env python3
Guido van Rossum4e620371995-04-10 11:46:03 +00002
3# Remote python server.
4# Execute Python commands remotely and send output back.
5# WARNING: This version has a gaping security hole -- it accepts requests
6# from any host on the Internet!
7
8import sys
9from socket import *
Collin Winter6f2df4d2007-07-17 20:59:35 +000010import io
Guido van Rossum4e620371995-04-10 11:46:03 +000011import traceback
12
13PORT = 4127
14BUFSIZE = 1024
15
16def main():
Tim Peterse6ddc8b2004-07-18 05:56:09 +000017 if len(sys.argv) > 1:
18 port = int(eval(sys.argv[1]))
19 else:
20 port = PORT
21 s = socket(AF_INET, SOCK_STREAM)
22 s.bind(('', port))
23 s.listen(1)
24 while 1:
25 conn, (remotehost, remoteport) = s.accept()
Collin Winter6f2df4d2007-07-17 20:59:35 +000026 print('connected by', remotehost, remoteport)
Tim Peterse6ddc8b2004-07-18 05:56:09 +000027 request = ''
28 while 1:
29 data = conn.recv(BUFSIZE)
30 if not data:
31 break
32 request = request + data
33 reply = execute(request)
34 conn.send(reply)
35 conn.close()
Guido van Rossum4e620371995-04-10 11:46:03 +000036
37def execute(request):
Tim Peterse6ddc8b2004-07-18 05:56:09 +000038 stdout = sys.stdout
39 stderr = sys.stderr
Collin Winter6f2df4d2007-07-17 20:59:35 +000040 sys.stdout = sys.stderr = fakefile = io.StringIO()
Tim Peterse6ddc8b2004-07-18 05:56:09 +000041 try:
42 try:
Georg Brandl7cae87c2006-09-06 06:51:57 +000043 exec(request, {}, {})
Tim Peterse6ddc8b2004-07-18 05:56:09 +000044 except:
Collin Winter6f2df4d2007-07-17 20:59:35 +000045 print()
Tim Peterse6ddc8b2004-07-18 05:56:09 +000046 traceback.print_exc(100)
47 finally:
48 sys.stderr = stderr
49 sys.stdout = stdout
50 return fakefile.getvalue()
Guido van Rossum4e620371995-04-10 11:46:03 +000051
52main()