text stringlengths 1 93.6k |
|---|
if kwargs['language']:
|
logging.info("Hint: Maybe there were no books in the specified --language?")
|
return
|
with track_context:
|
for book in (
|
track(books_to_download, description="Downloading books…")
|
if len(books_to_download) > 1
|
else books_to_download
|
):
|
logging.info(f"Book: “{book.title}”")
|
if not kwargs["no_download"]:
|
download_book(
|
book=book,
|
**kwargs
|
)
|
if __name__ == '__main__':
|
main()
|
# <FILESEP>
|
# -*- coding: utf-8 -*-
|
import sys
|
import os
|
import socket
|
import ssl
|
import select
|
import httplib
|
import urlparse
|
import threading
|
import gzip
|
import zlib
|
import time
|
import json
|
import re
|
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler
|
from SocketServer import ThreadingMixIn
|
from cStringIO import StringIO
|
from subprocess import Popen, PIPE
|
from HTMLParser import HTMLParser
|
def with_color(c, s):
|
return "\x1b[%dm%s\x1b[0m" % (c, s)
|
def join_with_script_dir(path):
|
return os.path.join(os.path.dirname(os.path.abspath(__file__)), path)
|
class ThreadingHTTPServer(ThreadingMixIn, HTTPServer):
|
address_family = socket.AF_INET6
|
daemon_threads = True
|
def handle_error(self, request, client_address):
|
# surpress socket/ssl related errors
|
cls, e = sys.exc_info()[:2]
|
if cls is socket.error or cls is ssl.SSLError:
|
pass
|
else:
|
return HTTPServer.handle_error(self, request, client_address)
|
class ProxyRequestHandler(BaseHTTPRequestHandler):
|
cakey = join_with_script_dir('ca.key')
|
cacert = join_with_script_dir('ca.crt')
|
certkey = join_with_script_dir('cert.key')
|
certdir = join_with_script_dir('certs/')
|
timeout = 5
|
lock = threading.Lock()
|
def __init__(self, *args, **kwargs):
|
self.tls = threading.local()
|
self.tls.conns = {}
|
BaseHTTPRequestHandler.__init__(self, *args, **kwargs)
|
def log_error(self, format, *args):
|
# surpress "Request timed out: timeout('timed out',)"
|
if isinstance(args[0], socket.timeout):
|
return
|
self.log_message(format, *args)
|
def do_CONNECT(self):
|
if os.path.isfile(self.cakey) and os.path.isfile(self.cacert) and os.path.isfile(self.certkey) and os.path.isdir(self.certdir):
|
self.connect_intercept()
|
else:
|
self.connect_relay()
|
def connect_intercept(self):
|
hostname = self.path.split(':')[0]
|
certpath = "%s/%s.crt" % (self.certdir.rstrip('/'), hostname)
|
with self.lock:
|
if not os.path.isfile(certpath):
|
epoch = "%d" % (time.time() * 1000)
|
p1 = Popen(["openssl", "req", "-new", "-key", self.certkey, "-subj", "/CN=%s" % hostname], stdout=PIPE)
|
p2 = Popen(["openssl", "x509", "-req", "-days", "3650", "-CA", self.cacert, "-CAkey", self.cakey, "-set_serial", epoch, "-out", certpath], stdin=p1.stdout, stderr=PIPE)
|
p2.communicate()
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.