1 | """Microsoft Internet Explorer cookie loading on Windows.
|
---|
2 |
|
---|
3 | Copyright 2002-2003 Johnny Lee <typo_pl@hotmail.com> (MSIE Perl code)
|
---|
4 | Copyright 2002-2006 John J Lee <jjl@pobox.com> (The Python port)
|
---|
5 |
|
---|
6 | This code is free software; you can redistribute it and/or modify it
|
---|
7 | under the terms of the BSD or ZPL 2.1 licenses (see the file
|
---|
8 | COPYING.txt included with the distribution).
|
---|
9 |
|
---|
10 | """
|
---|
11 |
|
---|
12 | # XXX names and comments are not great here
|
---|
13 |
|
---|
14 | import os, re, time, struct, logging
|
---|
15 | if os.name == "nt":
|
---|
16 | import _winreg
|
---|
17 |
|
---|
18 | from _clientcookie import FileCookieJar, CookieJar, Cookie, \
|
---|
19 | MISSING_FILENAME_TEXT, LoadError
|
---|
20 |
|
---|
21 | debug = logging.getLogger("mechanize").debug
|
---|
22 |
|
---|
23 |
|
---|
24 | def regload(path, leaf):
|
---|
25 | key = _winreg.OpenKey(_winreg.HKEY_CURRENT_USER, path, 0,
|
---|
26 | _winreg.KEY_ALL_ACCESS)
|
---|
27 | try:
|
---|
28 | value = _winreg.QueryValueEx(key, leaf)[0]
|
---|
29 | except WindowsError:
|
---|
30 | value = None
|
---|
31 | return value
|
---|
32 |
|
---|
33 | WIN32_EPOCH = 0x019db1ded53e8000L # 1970 Jan 01 00:00:00 in Win32 FILETIME
|
---|
34 |
|
---|
35 | def epoch_time_offset_from_win32_filetime(filetime):
|
---|
36 | """Convert from win32 filetime to seconds-since-epoch value.
|
---|
37 |
|
---|
38 | MSIE stores create and expire times as Win32 FILETIME, which is 64
|
---|
39 | bits of 100 nanosecond intervals since Jan 01 1601.
|
---|
40 |
|
---|
41 | mechanize expects time in 32-bit value expressed in seconds since the
|
---|
42 | epoch (Jan 01 1970).
|
---|
43 |
|
---|
44 | """
|
---|
45 | if filetime < WIN32_EPOCH:
|
---|
46 | raise ValueError("filetime (%d) is before epoch (%d)" %
|
---|
47 | (filetime, WIN32_EPOCH))
|
---|
48 |
|
---|
49 | return divmod((filetime - WIN32_EPOCH), 10000000L)[0]
|
---|
50 |
|
---|
51 | def binary_to_char(c): return "%02X" % ord(c)
|
---|
52 | def binary_to_str(d): return "".join(map(binary_to_char, list(d)))
|
---|
53 |
|
---|
54 | class MSIEBase:
|
---|
55 | magic_re = re.compile(r"Client UrlCache MMF Ver \d\.\d.*")
|
---|
56 | padding = "\x0d\xf0\xad\x0b"
|
---|
57 |
|
---|
58 | msie_domain_re = re.compile(r"^([^/]+)(/.*)$")
|
---|
59 | cookie_re = re.compile("Cookie\:.+\@([\x21-\xFF]+).*?"
|
---|
60 | "(.+\@[\x21-\xFF]+\.txt)")
|
---|
61 |
|
---|
62 | # path under HKEY_CURRENT_USER from which to get location of index.dat
|
---|
63 | reg_path = r"software\microsoft\windows" \
|
---|
64 | r"\currentversion\explorer\shell folders"
|
---|
65 | reg_key = "Cookies"
|
---|
66 |
|
---|
67 | def __init__(self):
|
---|
68 | self._delayload_domains = {}
|
---|
69 |
|
---|
70 | def _delayload_domain(self, domain):
|
---|
71 | # if necessary, lazily load cookies for this domain
|
---|
72 | delayload_info = self._delayload_domains.get(domain)
|
---|
73 | if delayload_info is not None:
|
---|
74 | cookie_file, ignore_discard, ignore_expires = delayload_info
|
---|
75 | try:
|
---|
76 | self.load_cookie_data(cookie_file,
|
---|
77 | ignore_discard, ignore_expires)
|
---|
78 | except (LoadError, IOError):
|
---|
79 | debug("error reading cookie file, skipping: %s", cookie_file)
|
---|
80 | else:
|
---|
81 | del self._delayload_domains[domain]
|
---|
82 |
|
---|
83 | def _load_cookies_from_file(self, filename):
|
---|
84 | debug("Loading MSIE cookies file: %s", filename)
|
---|
85 | cookies = []
|
---|
86 |
|
---|
87 | cookies_fh = open(filename)
|
---|
88 |
|
---|
89 | try:
|
---|
90 | while 1:
|
---|
91 | key = cookies_fh.readline()
|
---|
92 | if key == "": break
|
---|
93 |
|
---|
94 | rl = cookies_fh.readline
|
---|
95 | def getlong(rl=rl): return long(rl().rstrip())
|
---|
96 | def getstr(rl=rl): return rl().rstrip()
|
---|
97 |
|
---|
98 | key = key.rstrip()
|
---|
99 | value = getstr()
|
---|
100 | domain_path = getstr()
|
---|
101 | flags = getlong() # 0x2000 bit is for secure I think
|
---|
102 | lo_expire = getlong()
|
---|
103 | hi_expire = getlong()
|
---|
104 | lo_create = getlong()
|
---|
105 | hi_create = getlong()
|
---|
106 | sep = getstr()
|
---|
107 |
|
---|
108 | if "" in (key, value, domain_path, flags, hi_expire, lo_expire,
|
---|
109 | hi_create, lo_create, sep) or (sep != "*"):
|
---|
110 | break
|
---|
111 |
|
---|
112 | m = self.msie_domain_re.search(domain_path)
|
---|
113 | if m:
|
---|
114 | domain = m.group(1)
|
---|
115 | path = m.group(2)
|
---|
116 |
|
---|
117 | cookies.append({"KEY": key, "VALUE": value,
|
---|
118 | "DOMAIN": domain, "PATH": path,
|
---|
119 | "FLAGS": flags, "HIXP": hi_expire,
|
---|
120 | "LOXP": lo_expire, "HICREATE": hi_create,
|
---|
121 | "LOCREATE": lo_create})
|
---|
122 | finally:
|
---|
123 | cookies_fh.close()
|
---|
124 |
|
---|
125 | return cookies
|
---|
126 |
|
---|
127 | def load_cookie_data(self, filename,
|
---|
128 | ignore_discard=False, ignore_expires=False):
|
---|
129 | """Load cookies from file containing actual cookie data.
|
---|
130 |
|
---|
131 | Old cookies are kept unless overwritten by newly loaded ones.
|
---|
132 |
|
---|
133 | You should not call this method if the delayload attribute is set.
|
---|
134 |
|
---|
135 | I think each of these files contain all cookies for one user, domain,
|
---|
136 | and path.
|
---|
137 |
|
---|
138 | filename: file containing cookies -- usually found in a file like
|
---|
139 | C:\WINNT\Profiles\joe\Cookies\joe@blah[1].txt
|
---|
140 |
|
---|
141 | """
|
---|
142 | now = int(time.time())
|
---|
143 |
|
---|
144 | cookie_data = self._load_cookies_from_file(filename)
|
---|
145 |
|
---|
146 | for cookie in cookie_data:
|
---|
147 | flags = cookie["FLAGS"]
|
---|
148 | secure = ((flags & 0x2000) != 0)
|
---|
149 | filetime = (cookie["HIXP"] << 32) + cookie["LOXP"]
|
---|
150 | expires = epoch_time_offset_from_win32_filetime(filetime)
|
---|
151 | if expires < now:
|
---|
152 | discard = True
|
---|
153 | else:
|
---|
154 | discard = False
|
---|
155 | domain = cookie["DOMAIN"]
|
---|
156 | initial_dot = domain.startswith(".")
|
---|
157 | if initial_dot:
|
---|
158 | domain_specified = True
|
---|
159 | else:
|
---|
160 | # MSIE 5 does not record whether the domain cookie-attribute
|
---|
161 | # was specified.
|
---|
162 | # Assuming it wasn't is conservative, because with strict
|
---|
163 | # domain matching this will match less frequently; with regular
|
---|
164 | # Netscape tail-matching, this will match at exactly the same
|
---|
165 | # times that domain_specified = True would. It also means we
|
---|
166 | # don't have to prepend a dot to achieve consistency with our
|
---|
167 | # own & Mozilla's domain-munging scheme.
|
---|
168 | domain_specified = False
|
---|
169 |
|
---|
170 | # assume path_specified is false
|
---|
171 | # XXX is there other stuff in here? -- eg. comment, commentURL?
|
---|
172 | c = Cookie(0,
|
---|
173 | cookie["KEY"], cookie["VALUE"],
|
---|
174 | None, False,
|
---|
175 | domain, domain_specified, initial_dot,
|
---|
176 | cookie["PATH"], False,
|
---|
177 | secure,
|
---|
178 | expires,
|
---|
179 | discard,
|
---|
180 | None,
|
---|
181 | None,
|
---|
182 | {"flags": flags})
|
---|
183 | if not ignore_discard and c.discard:
|
---|
184 | continue
|
---|
185 | if not ignore_expires and c.is_expired(now):
|
---|
186 | continue
|
---|
187 | CookieJar.set_cookie(self, c)
|
---|
188 |
|
---|
189 | def load_from_registry(self, ignore_discard=False, ignore_expires=False,
|
---|
190 | username=None):
|
---|
191 | """
|
---|
192 | username: only required on win9x
|
---|
193 |
|
---|
194 | """
|
---|
195 | cookies_dir = regload(self.reg_path, self.reg_key)
|
---|
196 | filename = os.path.normpath(os.path.join(cookies_dir, "INDEX.DAT"))
|
---|
197 | self.load(filename, ignore_discard, ignore_expires, username)
|
---|
198 |
|
---|
199 | def _really_load(self, index, filename, ignore_discard, ignore_expires,
|
---|
200 | username):
|
---|
201 | now = int(time.time())
|
---|
202 |
|
---|
203 | if username is None:
|
---|
204 | username = os.environ['USERNAME'].lower()
|
---|
205 |
|
---|
206 | cookie_dir = os.path.dirname(filename)
|
---|
207 |
|
---|
208 | data = index.read(256)
|
---|
209 | if len(data) != 256:
|
---|
210 | raise LoadError("%s file is too short" % filename)
|
---|
211 |
|
---|
212 | # Cookies' index.dat file starts with 32 bytes of signature
|
---|
213 | # followed by an offset to the first record, stored as a little-
|
---|
214 | # endian DWORD.
|
---|
215 | sig, size, data = data[:32], data[32:36], data[36:]
|
---|
216 | size = struct.unpack("<L", size)[0]
|
---|
217 |
|
---|
218 | # check that sig is valid
|
---|
219 | if not self.magic_re.match(sig) or size != 0x4000:
|
---|
220 | raise LoadError("%s ['%s' %s] does not seem to contain cookies" %
|
---|
221 | (str(filename), sig, size))
|
---|
222 |
|
---|
223 | # skip to start of first record
|
---|
224 | index.seek(size, 0)
|
---|
225 |
|
---|
226 | sector = 128 # size of sector in bytes
|
---|
227 |
|
---|
228 | while 1:
|
---|
229 | data = ""
|
---|
230 |
|
---|
231 | # Cookies are usually in two contiguous sectors, so read in two
|
---|
232 | # sectors and adjust if not a Cookie.
|
---|
233 | to_read = 2 * sector
|
---|
234 | d = index.read(to_read)
|
---|
235 | if len(d) != to_read:
|
---|
236 | break
|
---|
237 | data = data + d
|
---|
238 |
|
---|
239 | # Each record starts with a 4-byte signature and a count
|
---|
240 | # (little-endian DWORD) of sectors for the record.
|
---|
241 | sig, size, data = data[:4], data[4:8], data[8:]
|
---|
242 | size = struct.unpack("<L", size)[0]
|
---|
243 |
|
---|
244 | to_read = (size - 2) * sector
|
---|
245 |
|
---|
246 | ## from urllib import quote
|
---|
247 | ## print "data", quote(data)
|
---|
248 | ## print "sig", quote(sig)
|
---|
249 | ## print "size in sectors", size
|
---|
250 | ## print "size in bytes", size*sector
|
---|
251 | ## print "size in units of 16 bytes", (size*sector) / 16
|
---|
252 | ## print "size to read in bytes", to_read
|
---|
253 | ## print
|
---|
254 |
|
---|
255 | if sig != "URL ":
|
---|
256 | assert sig in ("HASH", "LEAK", \
|
---|
257 | self.padding, "\x00\x00\x00\x00"), \
|
---|
258 | "unrecognized MSIE index.dat record: %s" % \
|
---|
259 | binary_to_str(sig)
|
---|
260 | if sig == "\x00\x00\x00\x00":
|
---|
261 | # assume we've got all the cookies, and stop
|
---|
262 | break
|
---|
263 | if sig == self.padding:
|
---|
264 | continue
|
---|
265 | # skip the rest of this record
|
---|
266 | assert to_read >= 0
|
---|
267 | if size != 2:
|
---|
268 | assert to_read != 0
|
---|
269 | index.seek(to_read, 1)
|
---|
270 | continue
|
---|
271 |
|
---|
272 | # read in rest of record if necessary
|
---|
273 | if size > 2:
|
---|
274 | more_data = index.read(to_read)
|
---|
275 | if len(more_data) != to_read: break
|
---|
276 | data = data + more_data
|
---|
277 |
|
---|
278 | cookie_re = ("Cookie\:%s\@([\x21-\xFF]+).*?" % username +
|
---|
279 | "(%s\@[\x21-\xFF]+\.txt)" % username)
|
---|
280 | m = re.search(cookie_re, data, re.I)
|
---|
281 | if m:
|
---|
282 | cookie_file = os.path.join(cookie_dir, m.group(2))
|
---|
283 | if not self.delayload:
|
---|
284 | try:
|
---|
285 | self.load_cookie_data(cookie_file,
|
---|
286 | ignore_discard, ignore_expires)
|
---|
287 | except (LoadError, IOError):
|
---|
288 | debug("error reading cookie file, skipping: %s",
|
---|
289 | cookie_file)
|
---|
290 | else:
|
---|
291 | domain = m.group(1)
|
---|
292 | i = domain.find("/")
|
---|
293 | if i != -1:
|
---|
294 | domain = domain[:i]
|
---|
295 |
|
---|
296 | self._delayload_domains[domain] = (
|
---|
297 | cookie_file, ignore_discard, ignore_expires)
|
---|
298 |
|
---|
299 |
|
---|
300 | class MSIECookieJar(MSIEBase, FileCookieJar):
|
---|
301 | """FileCookieJar that reads from the Windows MSIE cookies database.
|
---|
302 |
|
---|
303 | MSIECookieJar can read the cookie files of Microsoft Internet Explorer
|
---|
304 | (MSIE) for Windows version 5 on Windows NT and version 6 on Windows XP and
|
---|
305 | Windows 98. Other configurations may also work, but are untested. Saving
|
---|
306 | cookies in MSIE format is NOT supported. If you save cookies, they'll be
|
---|
307 | in the usual Set-Cookie3 format, which you can read back in using an
|
---|
308 | instance of the plain old CookieJar class. Don't save using the same
|
---|
309 | filename that you loaded cookies from, because you may succeed in
|
---|
310 | clobbering your MSIE cookies index file!
|
---|
311 |
|
---|
312 | You should be able to have LWP share Internet Explorer's cookies like
|
---|
313 | this (note you need to supply a username to load_from_registry if you're on
|
---|
314 | Windows 9x or Windows ME):
|
---|
315 |
|
---|
316 | cj = MSIECookieJar(delayload=1)
|
---|
317 | # find cookies index file in registry and load cookies from it
|
---|
318 | cj.load_from_registry()
|
---|
319 | opener = mechanize.build_opener(mechanize.HTTPCookieProcessor(cj))
|
---|
320 | response = opener.open("http://example.com/")
|
---|
321 |
|
---|
322 | Iterating over a delayloaded MSIECookieJar instance will not cause any
|
---|
323 | cookies to be read from disk. To force reading of all cookies from disk,
|
---|
324 | call read_all_cookies. Note that the following methods iterate over self:
|
---|
325 | clear_temporary_cookies, clear_expired_cookies, __len__, __repr__, __str__
|
---|
326 | and as_string.
|
---|
327 |
|
---|
328 | Additional methods:
|
---|
329 |
|
---|
330 | load_from_registry(ignore_discard=False, ignore_expires=False,
|
---|
331 | username=None)
|
---|
332 | load_cookie_data(filename, ignore_discard=False, ignore_expires=False)
|
---|
333 | read_all_cookies()
|
---|
334 |
|
---|
335 | """
|
---|
336 | def __init__(self, filename=None, delayload=False, policy=None):
|
---|
337 | MSIEBase.__init__(self)
|
---|
338 | FileCookieJar.__init__(self, filename, delayload, policy)
|
---|
339 |
|
---|
340 | def set_cookie(self, cookie):
|
---|
341 | if self.delayload:
|
---|
342 | self._delayload_domain(cookie.domain)
|
---|
343 | CookieJar.set_cookie(self, cookie)
|
---|
344 |
|
---|
345 | def _cookies_for_request(self, request):
|
---|
346 | """Return a list of cookies to be returned to server."""
|
---|
347 | domains = self._cookies.copy()
|
---|
348 | domains.update(self._delayload_domains)
|
---|
349 | domains = domains.keys()
|
---|
350 |
|
---|
351 | cookies = []
|
---|
352 | for domain in domains:
|
---|
353 | cookies.extend(self._cookies_for_domain(domain, request))
|
---|
354 | return cookies
|
---|
355 |
|
---|
356 | def _cookies_for_domain(self, domain, request):
|
---|
357 | if not self._policy.domain_return_ok(domain, request):
|
---|
358 | return []
|
---|
359 | debug("Checking %s for cookies to return", domain)
|
---|
360 | if self.delayload:
|
---|
361 | self._delayload_domain(domain)
|
---|
362 | return CookieJar._cookies_for_domain(self, domain, request)
|
---|
363 |
|
---|
364 | def read_all_cookies(self):
|
---|
365 | """Eagerly read in all cookies."""
|
---|
366 | if self.delayload:
|
---|
367 | for domain in self._delayload_domains.keys():
|
---|
368 | self._delayload_domain(domain)
|
---|
369 |
|
---|
370 | def load(self, filename, ignore_discard=False, ignore_expires=False,
|
---|
371 | username=None):
|
---|
372 | """Load cookies from an MSIE 'index.dat' cookies index file.
|
---|
373 |
|
---|
374 | filename: full path to cookie index file
|
---|
375 | username: only required on win9x
|
---|
376 |
|
---|
377 | """
|
---|
378 | if filename is None:
|
---|
379 | if self.filename is not None: filename = self.filename
|
---|
380 | else: raise ValueError(MISSING_FILENAME_TEXT)
|
---|
381 |
|
---|
382 | index = open(filename, "rb")
|
---|
383 |
|
---|
384 | try:
|
---|
385 | self._really_load(index, filename, ignore_discard, ignore_expires,
|
---|
386 | username)
|
---|
387 | finally:
|
---|
388 | index.close()
|
---|