kopia lustrzana https://github.com/yt-dlp/yt-dlp
Porównaj commity
11 Commity
c98b001c6c
...
01fa9c9db1
Autor | SHA1 | Data |
---|---|---|
bashonly | 01fa9c9db1 | |
Simon Sawicki | 64766459e3 | |
bashonly | 6c7bfb5c7c | |
bashonly | 805f40a001 | |
bashonly | b77ccbc67b | |
bashonly | d5d83395ab | |
bashonly | f2f108b754 | |
bashonly | d66fa6a118 | |
bashonly | 3b48105b8c | |
bashonly | 89f535e265 | |
bashonly | 64d4c4ba72 |
|
@ -53,7 +53,7 @@ jobs:
|
||||||
with:
|
with:
|
||||||
python-version: ${{ matrix.python-version }}
|
python-version: ${{ matrix.python-version }}
|
||||||
- name: Install test requirements
|
- name: Install test requirements
|
||||||
run: python3 ./devscripts/install_deps.py --include dev --include curl_cffi
|
run: python3 ./devscripts/install_deps.py --include dev --include curl-cffi
|
||||||
- name: Run tests
|
- name: Run tests
|
||||||
continue-on-error: False
|
continue-on-error: False
|
||||||
run: |
|
run: |
|
||||||
|
|
|
@ -785,6 +785,25 @@ class TestHTTPImpersonateRequestHandler(TestRequestHandlerBase):
|
||||||
assert res.status == 200
|
assert res.status == 200
|
||||||
assert std_headers['user-agent'].lower() not in res.read().decode().lower()
|
assert std_headers['user-agent'].lower() not in res.read().decode().lower()
|
||||||
|
|
||||||
|
def test_response_extensions(self, handler):
|
||||||
|
with handler() as rh:
|
||||||
|
for target in rh.supported_targets:
|
||||||
|
request = Request(
|
||||||
|
f'http://127.0.0.1:{self.http_port}/gen_200', extensions={'impersonate': target})
|
||||||
|
res = validate_and_send(rh, request)
|
||||||
|
assert res.extensions['impersonate'] == rh._get_request_target(request)
|
||||||
|
|
||||||
|
def test_http_error_response_extensions(self, handler):
|
||||||
|
with handler() as rh:
|
||||||
|
for target in rh.supported_targets:
|
||||||
|
request = Request(
|
||||||
|
f'http://127.0.0.1:{self.http_port}/gen_404', extensions={'impersonate': target})
|
||||||
|
try:
|
||||||
|
validate_and_send(rh, request)
|
||||||
|
except HTTPError as e:
|
||||||
|
res = e.response
|
||||||
|
assert res.extensions['impersonate'] == rh._get_request_target(request)
|
||||||
|
|
||||||
|
|
||||||
class TestRequestHandlerMisc:
|
class TestRequestHandlerMisc:
|
||||||
"""Misc generic tests for request handlers, not related to request or validation testing"""
|
"""Misc generic tests for request handlers, not related to request or validation testing"""
|
||||||
|
|
|
@ -2059,7 +2059,22 @@ Line 1
|
||||||
assert extract_basic_auth('http://user:pass@foo.bar') == ('http://foo.bar', 'Basic dXNlcjpwYXNz')
|
assert extract_basic_auth('http://user:pass@foo.bar') == ('http://foo.bar', 'Basic dXNlcjpwYXNz')
|
||||||
|
|
||||||
@unittest.skipUnless(compat_os_name == 'nt', 'Only relevant on Windows')
|
@unittest.skipUnless(compat_os_name == 'nt', 'Only relevant on Windows')
|
||||||
def test_Popen_windows_escaping(self):
|
def test_windows_escaping(self):
|
||||||
|
tests = [
|
||||||
|
'test"&',
|
||||||
|
'%CMDCMDLINE:~-1%&',
|
||||||
|
'a\nb',
|
||||||
|
'"',
|
||||||
|
'\\',
|
||||||
|
'!',
|
||||||
|
'^!',
|
||||||
|
'a \\ b',
|
||||||
|
'a \\" b',
|
||||||
|
'a \\ b\\',
|
||||||
|
# We replace \r with \n
|
||||||
|
('a\r\ra', 'a\n\na'),
|
||||||
|
]
|
||||||
|
|
||||||
def run_shell(args):
|
def run_shell(args):
|
||||||
stdout, stderr, error = Popen.run(
|
stdout, stderr, error = Popen.run(
|
||||||
args, text=True, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
args, text=True, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
||||||
|
@ -2067,15 +2082,18 @@ Line 1
|
||||||
assert not error
|
assert not error
|
||||||
return stdout
|
return stdout
|
||||||
|
|
||||||
# Test escaping
|
for argument in tests:
|
||||||
assert run_shell(['echo', 'test"&']) == '"test""&"\n'
|
if isinstance(argument, str):
|
||||||
assert run_shell(['echo', '%CMDCMDLINE:~-1%&']) == '"%CMDCMDLINE:~-1%&"\n'
|
expected = argument
|
||||||
assert run_shell(['echo', 'a\nb']) == '"a"\n"b"\n'
|
else:
|
||||||
assert run_shell(['echo', '"']) == '""""\n'
|
argument, expected = argument
|
||||||
assert run_shell(['echo', '\\']) == '\\\n'
|
|
||||||
# Test if delayed expansion is disabled
|
args = [sys.executable, '-c', 'import sys; print(end=sys.argv[1])', argument, 'end']
|
||||||
assert run_shell(['echo', '^!']) == '"^!"\n'
|
assert run_shell(args) == expected
|
||||||
assert run_shell('echo "^!"') == '"^!"\n'
|
|
||||||
|
escaped = shell_quote(argument, shell=True)
|
||||||
|
args = f'{sys.executable} -c "import sys; print(end=sys.argv[1])" {escaped} end'
|
||||||
|
assert run_shell(args) == expected
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
|
|
|
@ -132,6 +132,15 @@ class CurlCFFIRH(ImpersonateRequestHandler, InstanceStoreMixin):
|
||||||
extensions.pop('cookiejar', None)
|
extensions.pop('cookiejar', None)
|
||||||
extensions.pop('timeout', None)
|
extensions.pop('timeout', None)
|
||||||
|
|
||||||
|
def send(self, request: Request) -> Response:
|
||||||
|
try:
|
||||||
|
response = super().send(request)
|
||||||
|
except HTTPError as e:
|
||||||
|
e.response.extensions['impersonate'] = self._get_request_target(request)
|
||||||
|
raise
|
||||||
|
response.extensions['impersonate'] = self._get_request_target(request)
|
||||||
|
return response
|
||||||
|
|
||||||
def _send(self, request: Request):
|
def _send(self, request: Request):
|
||||||
max_redirects_exceeded = False
|
max_redirects_exceeded = False
|
||||||
session: curl_cffi.requests.Session = self._get_instance(
|
session: curl_cffi.requests.Session = self._get_instance(
|
||||||
|
|
|
@ -517,6 +517,7 @@ class Response(io.IOBase):
|
||||||
self.reason = reason or HTTPStatus(status).phrase
|
self.reason = reason or HTTPStatus(status).phrase
|
||||||
except ValueError:
|
except ValueError:
|
||||||
self.reason = None
|
self.reason = None
|
||||||
|
self.extensions = {}
|
||||||
|
|
||||||
def readable(self):
|
def readable(self):
|
||||||
return self.fp.readable()
|
return self.fp.readable()
|
||||||
|
|
|
@ -1638,16 +1638,14 @@ def get_filesystem_encoding():
|
||||||
return encoding if encoding is not None else 'utf-8'
|
return encoding if encoding is not None else 'utf-8'
|
||||||
|
|
||||||
|
|
||||||
_WINDOWS_QUOTE_TRANS = str.maketrans({'"': '\\"', '\\': '\\\\'})
|
_WINDOWS_QUOTE_TRANS = str.maketrans({'"': R'\"'})
|
||||||
_CMD_QUOTE_TRANS = str.maketrans({
|
_CMD_QUOTE_TRANS = str.maketrans({
|
||||||
# Keep quotes balanced by replacing them with `""` instead of `\\"`
|
# Keep quotes balanced by replacing them with `""` instead of `\\"`
|
||||||
'"': '""',
|
'"': '""',
|
||||||
# Requires a variable `=` containing `"^\n\n"` (set in `utils.Popen`)
|
# These require an env-variable `=` containing `"^\n\n"` (set in `utils.Popen`)
|
||||||
# `=` should be unique since variables containing `=` cannot be set using cmd
|
# `=` should be unique since variables containing `=` cannot be set using cmd
|
||||||
'\n': '%=%',
|
'\n': '%=%',
|
||||||
# While we are only required to escape backslashes immediately before quotes,
|
'\r': '%=%',
|
||||||
# we instead escape all of 'em anyways to be consistent
|
|
||||||
'\\': '\\\\',
|
|
||||||
# Use zero length variable replacement so `%` doesn't get expanded
|
# Use zero length variable replacement so `%` doesn't get expanded
|
||||||
# `cd` is always set as long as extensions are enabled (`/E:ON` in `utils.Popen`)
|
# `cd` is always set as long as extensions are enabled (`/E:ON` in `utils.Popen`)
|
||||||
'%': '%%cd:~,%',
|
'%': '%%cd:~,%',
|
||||||
|
@ -1656,19 +1654,14 @@ _CMD_QUOTE_TRANS = str.maketrans({
|
||||||
|
|
||||||
def shell_quote(args, *, shell=False):
|
def shell_quote(args, *, shell=False):
|
||||||
args = list(variadic(args))
|
args = list(variadic(args))
|
||||||
if any(isinstance(item, bytes) for item in args):
|
|
||||||
deprecation_warning('Passing bytes to utils.shell_quote is deprecated')
|
|
||||||
encoding = get_filesystem_encoding()
|
|
||||||
for index, item in enumerate(args):
|
|
||||||
if isinstance(item, bytes):
|
|
||||||
args[index] = item.decode(encoding)
|
|
||||||
|
|
||||||
if compat_os_name != 'nt':
|
if compat_os_name != 'nt':
|
||||||
return shlex.join(args)
|
return shlex.join(args)
|
||||||
|
|
||||||
trans = _CMD_QUOTE_TRANS if shell else _WINDOWS_QUOTE_TRANS
|
trans = _CMD_QUOTE_TRANS if shell else _WINDOWS_QUOTE_TRANS
|
||||||
return ' '.join(
|
return ' '.join(
|
||||||
s if re.fullmatch(r'[\w#$*\-+./:?@\\]+', s, re.ASCII) else s.translate(trans).join('""')
|
s if re.fullmatch(r'[\w#$*\-+./:?@\\]+', s, re.ASCII)
|
||||||
|
else re.sub(r'(\\+)("|$)', r'\1\1\2', s).translate(trans).join('""')
|
||||||
for s in args)
|
for s in args)
|
||||||
|
|
||||||
|
|
||||||
|
|
Ładowanie…
Reference in New Issue