[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.129.70.138: ~ $
r"""HTTP cookie handling for web clients.

This module has (now fairly distant) origins in Gisle Aas' Perl module
HTTP::Cookies, from the libwww-perl library.

Docstrings, comments and debug strings in this code refer to the
attributes of the HTTP cookie system as cookie-attributes, to distinguish
them clearly from Python attributes.

Class diagram (note that BSDDBCookieJar and the MSIE* classes are not
distributed with the Python standard library, but are available from
http://wwwsearch.sf.net/):

                        CookieJar____
                        /     \      \
            FileCookieJar      \      \
             /    |   \         \      \
 MozillaCookieJar | LWPCookieJar \      \
                  |               |      \
                  |   ---MSIEBase |       \
                  |  /      |     |        \
                  | /   MSIEDBCookieJar BSDDBCookieJar
                  |/
               MSIECookieJar

"""

__all__ = ['Cookie', 'CookieJar', 'CookiePolicy', 'DefaultCookiePolicy',
           'FileCookieJar', 'LWPCookieJar', 'lwp_cookie_str', 'LoadError',
           'MozillaCookieJar']

import re, urlparse, copy, time, urllib
try:
    import threading as _threading
except ImportError:
    import dummy_threading as _threading
import httplib  # only for the default HTTP port
from calendar import timegm

debug = False   # set to True to enable debugging via the logging module
logger = None

def _debug(*args):
    if not debug:
        return
    global logger
    if not logger:
        import logging
        logger = logging.getLogger("cookielib")
    return logger.debug(*args)


DEFAULT_HTTP_PORT = str(httplib.HTTP_PORT)
MISSING_FILENAME_TEXT = ("a filename was not supplied (nor was the CookieJar "
                         "instance initialised with one)")

def _warn_unhandled_exception():
    # There are a few catch-all except: statements in this module, for
    # catching input that's bad in unexpected ways.  Warn if any
    # exceptions are caught there.
    import warnings, traceback, StringIO
    f = StringIO.StringIO()
    traceback.print_exc(None, f)
    msg = f.getvalue()
    warnings.warn("cookielib bug!\n%s" % msg, stacklevel=2)


# Date/time conversion
# -----------------------------------------------------------------------------

EPOCH_YEAR = 1970
def _timegm(tt):
    year, month, mday, hour, min, sec = tt[:6]
    if ((year >= EPOCH_YEAR) and (1 <= month <= 12) and (1 <= mday <= 31) and
        (0 <= hour <= 24) and (0 <= min <= 59) and (0 <= sec <= 61)):
        return timegm(tt)
    else:
        return None

DAYS = ["Mon", "Tue", "Wed", "Thu", "Fri", "Sat", "Sun"]
MONTHS = ["Jan", "Feb", "Mar", "Apr", "May", "Jun",
          "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"]
MONTHS_LOWER = []
for month in MONTHS: MONTHS_LOWER.append(month.lower())

def time2isoz(t=None):
    """Return a string representing time in seconds since epoch, t.

    If the function is called without an argument, it will use the current
    time.

    The format of the returned string is like "YYYY-MM-DD hh:mm:ssZ",
    representing Universal Time (UTC, aka GMT).  An example of this format is:

    1994-11-24 08:49:37Z

    """
    if t is None: t = time.time()
    year, mon, mday, hour, min, sec = time.gmtime(t)[:6]
    return "%04d-%02d-%02d %02d:%02d:%02dZ" % (
        year, mon, mday, hour, min, sec)

def time2netscape(t=None):
    """Return a string representing time in seconds since epoch, t.

    If the function is called without an argument, it will use the current
    time.

    The format of the returned string is like this:

    Wed, DD-Mon-YYYY HH:MM:SS GMT

    """
    if t is None: t = time.time()
    year, mon, mday, hour, min, sec, wday = time.gmtime(t)[:7]
    return "%s %02d-%s-%04d %02d:%02d:%02d GMT" % (
        DAYS[wday], mday, MONTHS[mon-1], year, hour, min, sec)


UTC_ZONES = {"GMT": None, "UTC": None, "UT": None, "Z": None}

TIMEZONE_RE = re.compile(r"^([-+])?(\d\d?):?(\d\d)?$")
def offset_from_tz_string(tz):
    offset = None
    if tz in UTC_ZONES:
        offset = 0
    else:
        m = TIMEZONE_RE.search(tz)
        if m:
            offset = 3600 * int(m.group(2))
            if m.group(3):
                offset = offset + 60 * int(m.group(3))
            if m.group(1) == '-':
                offset = -offset
    return offset

def _str2time(day, mon, yr, hr, min, sec, tz):
    # translate month name to number
    # month numbers start with 1 (January)
    try:
        mon = MONTHS_LOWER.index(mon.lower())+1
    except ValueError:
        # maybe it's already a number
        try:
            imon = int(mon)
        except ValueError:
            return None
        if 1 <= imon <= 12:
            mon = imon
        else:
            return None

    # make sure clock elements are defined
    if hr is None: hr = 0
    if min is None: min = 0
    if sec is None: sec = 0

    yr = int(yr)
    day = int(day)
    hr = int(hr)
    min = int(min)
    sec = int(sec)

    if yr < 1000:
        # find "obvious" year
        cur_yr = time.localtime(time.time())[0]
        m = cur_yr % 100
        tmp = yr
        yr = yr + cur_yr - m
        m = m - tmp
        if abs(m) > 50:
            if m > 0: yr = yr + 100
            else: yr = yr - 100

    # convert UTC time tuple to seconds since epoch (not timezone-adjusted)
    t = _timegm((yr, mon, day, hr, min, sec, tz))

    if t is not None:
        # adjust time using timezone string, to get absolute time since epoch
        if tz is None:
            tz = "UTC"
        tz = tz.upper()
        offset = offset_from_tz_string(tz)
        if offset is None:
            return None
        t = t - offset

    return t

STRICT_DATE_RE = re.compile(
    r"^[SMTWF][a-z][a-z], (\d\d) ([JFMASOND][a-z][a-z]) "
    "(\d\d\d\d) (\d\d):(\d\d):(\d\d) GMT$")
WEEKDAY_RE = re.compile(
    r"^(?:Sun|Mon|Tue|Wed|Thu|Fri|Sat)[a-z]*,?\s*", re.I)
LOOSE_HTTP_DATE_RE = re.compile(
    r"""^
    (\d\d?)            # day
       (?:\s+|[-\/])
    (\w+)              # month
        (?:\s+|[-\/])
    (\d+)              # year
    (?:
          (?:\s+|:)    # separator before clock
       (\d\d?):(\d\d)  # hour:min
       (?::(\d\d))?    # optional seconds
    )?                 # optional clock
       \s*
    ([-+]?\d{2,4}|(?![APap][Mm]\b)[A-Za-z]+)? # timezone
       \s*
    (?:\(\w+\))?       # ASCII representation of timezone in parens.
       \s*$""", re.X)
def http2time(text):
    """Returns time in seconds since epoch of time represented by a string.

    Return value is an integer.

    None is returned if the format of str is unrecognized, the time is outside
    the representable range, or the timezone string is not recognized.  If the
    string contains no timezone, UTC is assumed.

    The timezone in the string may be numerical (like "-0800" or "+0100") or a
    string timezone (like "UTC", "GMT", "BST" or "EST").  Currently, only the
    timezone strings equivalent to UTC (zero offset) are known to the function.

    The function loosely parses the following formats:

    Wed, 09 Feb 1994 22:23:32 GMT       -- HTTP format
    Tuesday, 08-Feb-94 14:15:29 GMT     -- old rfc850 HTTP format
    Tuesday, 08-Feb-1994 14:15:29 GMT   -- broken rfc850 HTTP format
    09 Feb 1994 22:23:32 GMT            -- HTTP format (no weekday)
    08-Feb-94 14:15:29 GMT              -- rfc850 format (no weekday)
    08-Feb-1994 14:15:29 GMT            -- broken rfc850 format (no weekday)

    The parser ignores leading and trailing whitespace.  The time may be
    absent.

    If the year is given with only 2 digits, the function will select the
    century that makes the year closest to the current date.

    """
    # fast exit for strictly conforming string
    m = STRICT_DATE_RE.search(text)
    if m:
        g = m.groups()
        mon = MONTHS_LOWER.index(g[1].lower()) + 1
        tt = (int(g[2]), mon, int(g[0]),
              int(g[3]), int(g[4]), float(g[5]))
        return _timegm(tt)

    # No, we need some messy parsing...

    # clean up
    text = text.lstrip()
    text = WEEKDAY_RE.sub("", text, 1)  # Useless weekday

    # tz is time zone specifier string
    day, mon, yr, hr, min, sec, tz = [None]*7

    # loose regexp parse
    m = LOOSE_HTTP_DATE_RE.search(text)
    if m is not None:
        day, mon, yr, hr, min, sec, tz = m.groups()
    else:
        return None  # bad format

    return _str2time(day, mon, yr, hr, min, sec, tz)

ISO_DATE_RE = re.compile(
    """^
    (\d{4})              # year
       [-\/]?
    (\d\d?)              # numerical month
       [-\/]?
    (\d\d?)              # day
   (?:
         (?:\s+|[-:Tt])  # separator before clock
      (\d\d?):?(\d\d)    # hour:min
      (?::?(\d\d(?:\.\d*)?))?  # optional seconds (and fractional)
   )?                    # optional clock
      \s*
   ([-+]?\d\d?:?(:?\d\d)?
    |Z|z)?               # timezone  (Z is "zero meridian", i.e. GMT)
      \s*$""", re.X)
def iso2time(text):
    """
    As for http2time, but parses the ISO 8601 formats:

    1994-02-03 14:15:29 -0100    -- ISO 8601 format
    1994-02-03 14:15:29          -- zone is optional
    1994-02-03                   -- only date
    1994-02-03T14:15:29          -- Use T as separator
    19940203T141529Z             -- ISO 8601 compact format
    19940203                     -- only date

    """
    # clean up
    text = text.lstrip()

    # tz is time zone specifier string
    day, mon, yr, hr, min, sec, tz = [None]*7

    # loose regexp parse
    m = ISO_DATE_RE.search(text)
    if m is not None:
        # XXX there's an extra bit of the timezone I'm ignoring here: is
        #   this the right thing to do?
        yr, mon, day, hr, min, sec, tz, _ = m.groups()
    else:
        return None  # bad format

    return _str2time(day, mon, yr, hr, min, sec, tz)


# Header parsing
# -----------------------------------------------------------------------------

def unmatched(match):
    """Return unmatched part of re.Match object."""
    start, end = match.span(0)
    return match.string[:start]+match.string[end:]

HEADER_TOKEN_RE =        re.compile(r"^\s*([^=\s;,]+)")
HEADER_QUOTED_VALUE_RE = re.compile(r"^\s*=\s*\"([^\"\\]*(?:\\.[^\"\\]*)*)\"")
HEADER_VALUE_RE =        re.compile(r"^\s*=\s*([^\s;,]*)")
HEADER_ESCAPE_RE = re.compile(r"\\(.)")
def split_header_words(header_values):
    r"""Parse header values into a list of lists containing key,value pairs.

    The function knows how to deal with ",", ";" and "=" as well as quoted
    values after "=".  A list of space separated tokens are parsed as if they
    were separated by ";".

    If the header_values passed as argument contains multiple values, then they
    are treated as if they were a single value separated by comma ",".

    This means that this function is useful for parsing header fields that
    follow this syntax (BNF as from the HTTP/1.1 specification, but we relax
    the requirement for tokens).

      headers           = #header
      header            = (token | parameter) *( [";"] (token | parameter))

      token             = 1*<any CHAR except CTLs or separators>
      separators        = "(" | ")" | "<" | ">" | "@"
                        | "," | ";" | ":" | "\" | <">
                        | "/" | "[" | "]" | "?" | "="
                        | "{" | "}" | SP | HT

      quoted-string     = ( <"> *(qdtext | quoted-pair ) <"> )
      qdtext            = <any TEXT except <">>
      quoted-pair       = "\" CHAR

      parameter         = attribute "=" value
      attribute         = token
      value             = token | quoted-string

    Each header is represented by a list of key/value pairs.  The value for a
    simple token (not part of a parameter) is None.  Syntactically incorrect
    headers will not necessarily be parsed as you would want.

    This is easier to describe with some examples:

    >>> split_header_words(['foo="bar"; port="80,81"; discard, bar=baz'])
    [[('foo', 'bar'), ('port', '80,81'), ('discard', None)], [('bar', 'baz')]]
    >>> split_header_words(['text/html; charset="iso-8859-1"'])
    [[('text/html', None), ('charset', 'iso-8859-1')]]
    >>> split_header_words([r'Basic realm="\"foo\bar\""'])
    [[('Basic', None), ('realm', '"foobar"')]]

    """
    assert not isinstance(header_values, basestring)
    result = []
    for text in header_values:
        orig_text = text
        pairs = []
        while text:
            m = HEADER_TOKEN_RE.search(text)
            if m:
                text = unmatched(m)
                name = m.group(1)
                m = HEADER_QUOTED_VALUE_RE.search(text)
                if m:  # quoted value
                    text = unmatched(m)
                    value = m.group(1)
                    value = HEADER_ESCAPE_RE.sub(r"\1", value)
                else:
                    m = HEADER_VALUE_RE.search(text)
                    if m:  # unquoted value
                        text = unmatched(m)
                        value = m.group(1)
                        value = value.rstrip()
                    else:
                        # no value, a lone token
                        value = None
                pairs.append((name, value))
            elif text.lstrip().startswith(","):
                # concatenated headers, as per RFC 2616 section 4.2
                text = text.lstrip()[1:]
                if pairs: result.append(pairs)
                pairs = []
            else:
                # skip junk
                non_junk, nr_junk_chars = re.subn("^[=\s;]*", "", text)
                assert nr_junk_chars > 0, (
                    "split_header_words bug: '%s', '%s', %s" %
                    (orig_text, text, pairs))
                text = non_junk
        if pairs: result.append(pairs)
    return result

HEADER_JOIN_ESCAPE_RE = re.compile(r"([\"\\])")
def join_header_words(lists):
    """Do the inverse (almost) of the conversion done by split_header_words.

    Takes a list of lists of (key, value) pairs and produces a single header
    value.  Attribute values are quoted if needed.

    >>> join_header_words([[("text/plain", None), ("charset", "iso-8859/1")]])
    'text/plain; charset="iso-8859/1"'
    >>> join_header_words([[("text/plain", None)], [("charset", "iso-8859/1")]])
    'text/plain, charset="iso-8859/1"'

    """
    headers = []
    for pairs in lists:
        attr = []
        for k, v in pairs:
            if v is not None:
                if not re.search(r"^\w+$", v):
                    v = HEADER_JOIN_ESCAPE_RE.sub(r"\\\1", v)  # escape " and \
                    v = '"%s"' % v
                k = "%s=%s" % (k, v)
            attr.append(k)
        if attr: headers.append("; ".join(attr))
    return ", ".join(headers)

def _strip_quotes(text):
    if text.startswith('"'):
        text = text[1:]
    if text.endswith('"'):
        text = text[:-1]
    return text

def parse_ns_headers(ns_headers):
    """Ad-hoc parser for Netscape protocol cookie-attributes.

    The old Netscape cookie format for Set-Cookie can for instance contain
    an unquoted "," in the expires field, so we have to use this ad-hoc
    parser instead of split_header_words.

    XXX This may not make the best possible effort to parse all the crap
    that Netscape Cookie headers contain.  Ronald Tschalar's HTTPClient
    parser is probably better, so could do worse than following that if
    this ever gives any trouble.

    Currently, this is also used for parsing RFC 2109 cookies.

    """
    known_attrs = ("expires", "domain", "path", "secure",
                   # RFC 2109 attrs (may turn up in Netscape cookies, too)
                   "version", "port", "max-age")

    result = []
    for ns_header in ns_headers:
        pairs = []
        version_set = False
        for ii, param in enumerate(re.split(r";\s*", ns_header)):
            param = param.rstrip()
            if param == "": continue
            if "=" not in param:
                k, v = param, None
            else:
                k, v = re.split(r"\s*=\s*", param, 1)
                k = k.lstrip()
            if ii != 0:
                lc = k.lower()
                if lc in known_attrs:
                    k = lc
                if k == "version":
                    # This is an RFC 2109 cookie.
                    v = _strip_quotes(v)
                    version_set = True
                if k == "expires":
                    # convert expires date to seconds since epoch
                    v = http2time(_strip_quotes(v))  # None if invalid
            pairs.append((k, v))

        if pairs:
            if not version_set:
                pairs.append(("version", "0"))
            result.append(pairs)

    return result


IPV4_RE = re.compile(r"\.\d+$")
def is_HDN(text):
    """Return True if text is a host domain name."""
    # XXX
    # This may well be wrong.  Which RFC is HDN defined in, if any (for
    #  the purposes of RFC 2965)?
    # For the current implementation, what about IPv6?  Remember to look
    #  at other uses of IPV4_RE also, if change this.
    if IPV4_RE.search(text):
        return False
    if text == "":
        return False
    if text[0] == "." or text[-1] == ".":
        return False
    return True

def domain_match(A, B):
    """Return True if domain A domain-matches domain B, according to RFC 2965.

    A and B may be host domain names or IP addresses.

    RFC 2965, section 1:

    Host names can be specified either as an IP address or a HDN string.
    Sometimes we compare one host name with another.  (Such comparisons SHALL
    be case-insensitive.)  Host A's name domain-matches host B's if

         *  their host name strings string-compare equal; or

         * A is a HDN string and has the form NB, where N is a non-empty
            name string, B has the form .B', and B' is a HDN string.  (So,
            x.y.com domain-matches .Y.com but not Y.com.)

    Note that domain-match is not a commutative operation: a.b.c.com
    domain-matches .c.com, but not the reverse.

    """
    # Note that, if A or B are IP addresses, the only relevant part of the
    # definition of the domain-match algorithm is the direct string-compare.
    A = A.lower()
    B = B.lower()
    if A == B:
        return True
    if not is_HDN(A):
        return False
    i = A.rfind(B)
    if i == -1 or i == 0:
        # A does not have form NB, or N is the empty string
        return False
    if not B.startswith("."):
        return False
    if not is_HDN(B[1:]):
        return False
    return True

def liberal_is_HDN(text):
    """Return True if text is a sort-of-like a host domain name.

    For accepting/blocking domains.

    """
    if IPV4_RE.search(text):
        return False
    return True

def user_domain_match(A, B):
    """For blocking/accepting domains.

    A and B may be host domain names or IP addresses.

    """
    A = A.lower()
    B = B.lower()
    if not (liberal_is_HDN(A) and liberal_is_HDN(B)):
        if A == B:
            # equal IP addresses
            return True
        return False
    initial_dot = B.startswith(".")
    if initial_dot and A.endswith(B):
        return True
    if not initial_dot and A == B:
        return True
    return False

cut_port_re = re.compile(r":\d+$")
def request_host(request):
    """Return request-host, as defined by RFC 2965.

    Variation from RFC: returned value is lowercased, for convenient
    comparison.

    """
    url = request.get_full_url()
    host = urlparse.urlparse(url)[1]
    if host == "":
        host = request.get_header("Host", "")

    # remove port, if present
    host = cut_port_re.sub("", host, 1)
    return host.lower()

def eff_request_host(request):
    """Return a tuple (request-host, effective request-host name).

    As defined by RFC 2965, except both are lowercased.

    """
    erhn = req_host = request_host(request)
    if req_host.find(".") == -1 and not IPV4_RE.search(req_host):
        erhn = req_host + ".local"
    return req_host, erhn

def request_path(request):
    """Path component of request-URI, as defined by RFC 2965."""
    url = request.get_full_url()
    parts = urlparse.urlsplit(url)
    path = escape_path(parts.path)
    if not path.startswith("/"):
        # fix bad RFC 2396 absoluteURI
        path = "/" + path
    return path

def request_port(request):
    host = request.get_host()
    i = host.find(':')
    if i >= 0:
        port = host[i+1:]
        try:
            int(port)
        except ValueError:
            _debug("nonnumeric port: '%s'", port)
            return None
    else:
        port = DEFAULT_HTTP_PORT
    return port

# Characters in addition to A-Z, a-z, 0-9, '_', '.', and '-' that don't
# need to be escaped to form a valid HTTP URL (RFCs 2396 and 1738).
HTTP_PATH_SAFE = "%/;:@&=+$,!~*'()"
ESCAPED_CHAR_RE = re.compile(r"%([0-9a-fA-F][0-9a-fA-F])")
def uppercase_escaped_char(match):
    return "%%%s" % match.group(1).upper()
def escape_path(path):
    """Escape any invalid characters in HTTP URL, and uppercase all escapes."""
    # There's no knowing what character encoding was used to create URLs
    # containing %-escapes, but since we have to pick one to escape invalid
    # path characters, we pick UTF-8, as recommended in the HTML 4.0
    # specification:
    # http://www.w3.org/TR/REC-html40/appendix/notes.html#h-B.2.1
    # And here, kind of: draft-fielding-uri-rfc2396bis-03
    # (And in draft IRI specification: draft-duerst-iri-05)
    # (And here, for new URI schemes: RFC 2718)
    if isinstance(path, unicode):
        path = path.encode("utf-8")
    path = urllib.quote(path, HTTP_PATH_SAFE)
    path = ESCAPED_CHAR_RE.sub(uppercase_escaped_char, path)
    return path

def reach(h):
    """Return reach of host h, as defined by RFC 2965, section 1.

    The reach R of a host name H is defined as follows:

       *  If

          -  H is the host domain name of a host; and,

          -  H has the form A.B; and

          -  A has no embedded (that is, interior) dots; and

          -  B has at least one embedded dot, or B is the string "local".
             then the reach of H is .B.

       *  Otherwise, the reach of H is H.

    >>> reach("www.acme.com")
    '.acme.com'
    >>> reach("acme.com")
    'acme.com'
    >>> reach("acme.local")
    '.local'

    """
    i = h.find(".")
    if i >= 0:
        #a = h[:i]  # this line is only here to show what a is
        b = h[i+1:]
        i = b.find(".")
        if is_HDN(h) and (i >= 0 or b == "local"):
            return "."+b
    return h

def is_third_party(request):
    """

    RFC 2965, section 3.3.6:

        An unverifiable transaction is to a third-party host if its request-
        host U does not domain-match the reach R of the request-host O in the
        origin transaction.

    """
    req_host = request_host(request)
    if not domain_match(req_host, reach(request.get_origin_req_host())):
        return True
    else:
        return False


class Cookie:
    """HTTP Cookie.

    This class represents both Netscape and RFC 2965 cookies.

    This is deliberately a very simple class.  It just holds attributes.  It's
    possible to construct Cookie instances that don't comply with the cookie
    standards.  CookieJar.make_cookies is the factory function for Cookie
    objects -- it deals with cookie parsing, supplying defaults, and
    normalising to the representation used in this class.  CookiePolicy is
    responsible for checking them to see whether they should be accepted from
    and returned to the server.

    Note that the port may be present in the headers, but unspecified ("Port"
    rather than"Port=80", for example); if this is the case, port is None.

    """

    def __init__(self, version, name, value,
                 port, port_specified,
                 domain, domain_specified, domain_initial_dot,
                 path, path_specified,
                 secure,
                 expires,
                 discard,
                 comment,
                 comment_url,
                 rest,
                 rfc2109=False,
                 ):

        if version is not None: version = int(version)
        if expires is not None: expires = int(expires)
        if port is None and port_specified is True:
            raise ValueError("if port is None, port_specified must be false")

        self.version = version
        self.name = name
        self.value = value
        self.port = port
        self.port_specified = port_specified
        # normalise case, as per RFC 2965 section 3.3.3
        self.domain = domain.lower()
        self.domain_specified = domain_specified
        # Sigh.  We need to know whether the domain given in the
        # cookie-attribute had an initial dot, in order to follow RFC 2965
        # (as clarified in draft errata).  Needed for the returned $Domain
        # value.
        self.domain_initial_dot = domain_initial_dot
        self.path = path
        self.path_specified = path_specified
        self.secure = secure
        self.expires = expires
        self.discard = discard
        self.comment = comment
        self.comment_url = comment_url
        self.rfc2109 = rfc2109

        self._rest = copy.copy(rest)

    def has_nonstandard_attr(self, name):
        return name in self._rest
    def get_nonstandard_attr(self, name, default=None):
        return self._rest.get(name, default)
    def set_nonstandard_attr(self, name, value):
        self._rest[name] = value

    def is_expired(self, now=None):
        if now is None: now = time.time()
        if (self.expires is not None) and (self.expires <= now):
            return True
        return False

    def __str__(self):
        if self.port is None: p = ""
        else: p = ":"+self.port
        limit = self.domain + p + self.path
        if self.value is not None:
            namevalue = "%s=%s" % (self.name, self.value)
        else:
            namevalue = self.name
        return "<Cookie %s for %s>" % (namevalue, limit)

    def __repr__(self):
        args = []
        for name in ("version", "name", "value",
                     "port", "port_specified",
                     "domain", "domain_specified", "domain_initial_dot",
                     "path", "path_specified",
                     "secure", "expires", "discard", "comment", "comment_url",
                     ):
            attr = getattr(self, name)
            args.append("%s=%s" % (name, repr(attr)))
        args.append("rest=%s" % repr(self._rest))
        args.append("rfc2109=%s" % repr(self.rfc2109))
        return "Cookie(%s)" % ", ".join(args)


class CookiePolicy:
    """Defines which cookies get accepted from and returned to server.

    May also modify cookies, though this is probably a bad idea.

    The subclass DefaultCookiePolicy defines the standard rules for Netscape
    and RFC 2965 cookies -- override that if you want a customised policy.

    """
    def set_ok(self, cookie, request):
        """Return true if (and only if) cookie should be accepted from server.

        Currently, pre-expired cookies never get this far -- the CookieJar
        class deletes such cookies itself.

        """
        raise NotImplementedError()

    def return_ok(self, cookie, request):
        """Return true if (and only if) cookie should be returned to server."""
        raise NotImplementedError()

    def domain_return_ok(self, domain, request):
        """Return false if cookies should not be returned, given cookie domain.
        """
        return True

    def path_return_ok(self, path, request):
        """Return false if cookies should not be returned, given cookie path.
        """
        return True


class DefaultCookiePolicy(CookiePolicy):
    """Implements the standard rules for accepting and returning cookies."""

    DomainStrictNoDots = 1
    DomainStrictNonDomain = 2
    DomainRFC2965Match = 4

    DomainLiberal = 0
    DomainStrict = DomainStrictNoDots|DomainStrictNonDomain

    def __init__(self,
                 blocked_domains=None, allowed_domains=None,
                 netscape=True, rfc2965=False,
                 rfc2109_as_netscape=None,
                 hide_cookie2=False,
                 strict_domain=False,
                 strict_rfc2965_unverifiable=True,
                 strict_ns_unverifiable=False,
                 strict_ns_domain=DomainLiberal,
                 strict_ns_set_initial_dollar=False,
                 strict_ns_set_path=False,
                 ):
        """Constructor arguments should be passed as keyword arguments only."""
        self.netscape = netscape
        self.rfc2965 = rfc2965
        self.rfc2109_as_netscape = rfc2109_as_netscape
        self.hide_cookie2 = hide_cookie2
        self.strict_domain = strict_domain
        self.strict_rfc2965_unverifiable = strict_rfc2965_unverifiable
        self.strict_ns_unverifiable = strict_ns_unverifiable
        self.strict_ns_domain = strict_ns_domain
        self.strict_ns_set_initial_dollar = strict_ns_set_initial_dollar
        self.strict_ns_set_path = strict_ns_set_path

        if blocked_domains is not None:
            self._blocked_domains = tuple(blocked_domains)
        else:
            self._blocked_domains = ()

        if allowed_domains is not None:
            allowed_domains = tuple(allowed_domains)
        self._allowed_domains = allowed_domains

    def blocked_domains(self):
        """Return the sequence of blocked domains (as a tuple)."""
        return self._blocked_domains
    def set_blocked_domains(self, blocked_domains):
        """Set the sequence of blocked domains."""
        self._blocked_domains = tuple(blocked_domains)

    def is_blocked(self, domain):
        for blocked_domain in self._blocked_domains:
            if user_domain_match(domain, blocked_domain):
                return True
        return False

    def allowed_domains(self):
        """Return None, or the sequence of allowed domains (as a tuple)."""
        return self._allowed_domains
    def set_allowed_domains(self, allowed_domains):
        """Set the sequence of allowed domains, or None."""
        if allowed_domains is not None:
            allowed_domains = tuple(allowed_domains)
        self._allowed_domains = allowed_domains

    def is_not_allowed(self, domain):
        if self._allowed_domains is None:
            return False
        for allowed_domain in self._allowed_domains:
            if user_domain_match(domain, allowed_domain):
                return False
        return True

    def set_ok(self, cookie, request):
        """
        If you override .set_ok(), be sure to call this method.  If it returns
        false, so should your subclass (assuming your subclass wants to be more
        strict about which cookies to accept).

        """
        _debug(" - checking cookie %s=%s", cookie.name, cookie.value)

        assert cookie.name is not None

        for n in "version", "verifiability", "name", "path", "domain", "port":
            fn_name = "set_ok_"+n
            fn = getattr(self, fn_name)
            if not fn(cookie, request):
                return False

        return True

    def set_ok_version(self, cookie, request):
        if cookie.version is None:
            # Version is always set to 0 by parse_ns_headers if it's a Netscape
            # cookie, so this must be an invalid RFC 2965 cookie.
            _debug("   Set-Cookie2 without version attribute (%s=%s)",
                   cookie.name, cookie.value)
            return False
        if cookie.version > 0 and not self.rfc2965:
            _debug("   RFC 2965 cookies are switched off")
            return False
        elif cookie.version == 0 and not self.netscape:
            _debug("   Netscape cookies are switched off")
            return False
        return True

    def set_ok_verifiability(self, cookie, request):
        if request.is_unverifiable() and is_third_party(request):
            if cookie.version > 0 and self.strict_rfc2965_unverifiable:
                _debug("   third-party RFC 2965 cookie during "
                             "unverifiable transaction")
                return False
            elif cookie.version == 0 and self.strict_ns_unverifiable:
                _debug("   third-party Netscape cookie during "
                             "unverifiable transaction")
                return False
        return True

    def set_ok_name(self, cookie, request):
        # Try and stop servers setting V0 cookies designed to hack other
        # servers that know both V0 and V1 protocols.
        if (cookie.version == 0 and self.strict_ns_set_initial_dollar and
            cookie.name.startswith("$")):
            _debug("   illegal name (starts with '$'): '%s'", cookie.name)
            return False
        return True

    def set_ok_path(self, cookie, request):
        if cookie.path_specified:
            req_path = request_path(request)
            if ((cookie.version > 0 or
                 (cookie.version == 0 and self.strict_ns_set_path)) and
                not req_path.startswith(cookie.path)):
                _debug("   path attribute %s is not a prefix of request "
                       "path %s", cookie.path, req_path)
                return False
        return True

    def set_ok_domain(self, cookie, request):
        if self.is_blocked(cookie.domain):
            _debug("   domain %s is in user block-list", cookie.domain)
            return False
        if self.is_not_allowed(cookie.domain):
            _debug("   domain %s is not in user allow-list", cookie.domain)
            return False
        if cookie.domain_specified:
            req_host, erhn = eff_request_host(request)
            domain = cookie.domain
            if self.strict_domain and (domain.count(".") >= 2):
                # XXX This should probably be compared with the Konqueror
                # (kcookiejar.cpp) and Mozilla implementations, but it's a
                # losing battle.
                i = domain.rfind(".")
                j = domain.rfind(".", 0, i)
                if j == 0:  # domain like .foo.bar
                    tld = domain[i+1:]
                    sld = domain[j+1:i]
                    if sld.lower() in ("co", "ac", "com", "edu", "org", "net",
                       "gov", "mil", "int", "aero", "biz", "cat", "coop",
                       "info", "jobs", "mobi", "museum", "name", "pro",
                       "travel", "eu") and len(tld) == 2:
                        # domain like .co.uk
                        _debug("   country-code second level domain %s", domain)
                        return False
            if domain.startswith("."):
                undotted_domain = domain[1:]
            else:
                undotted_domain = domain
            embedded_dots = (undotted_domain.find(".") >= 0)
            if not embedded_dots and domain != ".local":
                _debug("   non-local domain %s contains no embedded dot",
                       domain)
                return False
            if cookie.version == 0:
                if (not erhn.endswith(domain) and
                    (not erhn.startswith(".") and
                     not ("."+erhn).endswith(domain))):
                    _debug("   effective request-host %s (even with added "
                           "initial dot) does not end with %s",
                           erhn, domain)
                    return False
            if (cookie.version > 0 or
                (self.strict_ns_domain & self.DomainRFC2965Match)):
                if not domain_match(erhn, domain):
                    _debug("   effective request-host %s does not domain-match "
                           "%s", erhn, domain)
                    return False
            if (cookie.version > 0 or
                (self.strict_ns_domain & self.DomainStrictNoDots)):
                host_prefix = req_host[:-len(domain)]
                if (host_prefix.find(".") >= 0 and
                    not IPV4_RE.search(req_host)):
                    _debug("   host prefix %s for domain %s contains a dot",
                           host_prefix, domain)
                    return False
        return True

    def set_ok_port(self, cookie, request):
        if cookie.port_specified:
            req_port = request_port(request)
            if req_port is None:
                req_port = "80"
            else:
                req_port = str(req_port)
            for p in cookie.port.split(","):
                try:
                    int(p)
                except ValueError:
                    _debug("   bad port %s (not numeric)", p)
                    return False
                if p == req_port:
                    break
            else:
                _debug("   request port (%s) not found in %s",
                       req_port, cookie.port)
                return False
        return True

    def return_ok(self, cookie, request):
        """
        If you override .return_ok(), be sure to call this method.  If it
        returns false, so should your subclass (assuming your subclass wants to
        be more strict about which cookies to return).

        """
        # Path has already been checked by .path_return_ok(), and domain
        # blocking done by .domain_return_ok().
        _debug(" - checking cookie %s=%s", cookie.name, cookie.value)

        for n in "version", "verifiability", "secure", "expires", "port", "domain":
            fn_name = "return_ok_"+n
            fn = getattr(self, fn_name)
            if not fn(cookie, request):
                return False
        return True

    def return_ok_version(self, cookie, request):
        if cookie.version > 0 and not self.rfc2965:
            _debug("   RFC 2965 cookies are switched off")
            return False
        elif cookie.version == 0 and not self.netscape:
            _debug("   Netscape cookies are switched off")
            return False
        return True

    def return_ok_verifiability(self, cookie, request):
        if request.is_unverifiable() and is_third_party(request):
            if cookie.version > 0 and self.strict_rfc2965_unverifiable:
                _debug("   third-party RFC 2965 cookie during unverifiable "
                       "transaction")
                return False
            elif cookie.version == 0 and self.strict_ns_unverifiable:
                _debug("   third-party Netscape cookie during unverifiable "
                       "transaction")
                return False
        return True

    def return_ok_secure(self, cookie, request):
        if cookie.secure and request.get_type() != "https":
            _debug("   secure cookie with non-secure request")
            return False
        return True

    def return_ok_expires(self, cookie, request):
        if cookie.is_expired(self._now):
            _debug("   cookie expired")
            return False
        return True

    def return_ok_port(self, cookie, request):
        if cookie.port:
            req_port = request_port(request)
            if req_port is None:
                req_port = "80"
            for p in cookie.port.split(","):
                if p == req_port:
                    break
            else:
                _debug("   request port %s does not match cookie port %s",
                       req_port, cookie.port)
                return False
        return True

    def return_ok_domain(self, cookie, request):
        req_host, erhn = eff_request_host(request)
        domain = cookie.domain

        if domain and not domain.startswith("."):
            dotdomain = "." + domain
        else:
            dotdomain = domain

        # strict check of non-domain cookies: Mozilla does this, MSIE5 doesn't
        if (cookie.version == 0 and
            (self.strict_ns_domain & self.DomainStrictNonDomain) and
            not cookie.domain_specified and domain != erhn):
            _debug("   cookie with unspecified domain does not string-compare "
                   "equal to request domain")
            return False

        if cookie.version > 0 and not domain_match(erhn, domain):
            _debug("   effective request-host name %s does not domain-match "
                   "RFC 2965 cookie domain %s", erhn, domain)
            return False
        if cookie.version == 0 and not ("."+erhn).endswith(dotdomain):
            _debug("   request-host %s does not match Netscape cookie domain "
                   "%s", req_host, domain)
            return False
        return True

    def domain_return_ok(self, domain, request):
        # Liberal check of.  This is here as an optimization to avoid
        # having to load lots of MSIE cookie files unless necessary.
        req_host, erhn = eff_request_host(request)
        if not req_host.startswith("."):
            req_host = "."+req_host
        if not erhn.startswith("."):
            erhn = "."+erhn
        if domain and not domain.startswith("."):
            dotdomain = "." + domain
        else:
            dotdomain = domain
        if not (req_host.endswith(dotdomain) or erhn.endswith(dotdomain)):
            #_debug("   request domain %s does not match cookie domain %s",
            #       req_host, domain)
            return False

        if self.is_blocked(domain):
            _debug("   domain %s is in user block-list", domain)
            return False
        if self.is_not_allowed(domain):
            _debug("   domain %s is not in user allow-list", domain)
            return False

        return True

    def path_return_ok(self, path, request):
        _debug("- checking cookie path=%s", path)
        req_path = request_path(request)
        if not req_path.startswith(path):
            _debug("  %s does not path-match %s", req_path, path)
            return False
        return True


def vals_sorted_by_key(adict):
    keys = adict.keys()
    keys.sort()
    return map(adict.get, keys)

def deepvalues(mapping):
    """Iterates over nested mapping, depth-first, in sorted order by key."""
    values = vals_sorted_by_key(mapping)
    for obj in values:
        mapping = False
        try:
            obj.items
        except AttributeError:
            pass
        else:
            mapping = True
            for subobj in deepvalues(obj):
                yield subobj
        if not mapping:
            yield obj


# Used as second parameter to dict.get() method, to distinguish absent
# dict key from one with a None value.
class Absent: pass

class CookieJar:
    """Collection of HTTP cookies.

    You may not need to know about this class: try
    urllib2.build_opener(HTTPCookieProcessor).open(url).

    """

    non_word_re = re.compile(r"\W")
    quote_re = re.compile(r"([\"\\])")
    strict_domain_re = re.compile(r"\.?[^.]*")
    domain_re = re.compile(r"[^.]*")
    dots_re = re.compile(r"^\.+")

    magic_re = r"^\#LWP-Cookies-(\d+\.\d+)"

    def __init__(self, policy=None):
        if policy is None:
            policy = DefaultCookiePolicy()
        self._policy = policy

        self._cookies_lock = _threading.RLock()
        self._cookies = {}

    def set_policy(self, policy):
        self._policy = policy

    def _cookies_for_domain(self, domain, request):
        cookies = []
        if not self._policy.domain_return_ok(domain, request):
            return []
        _debug("Checking %s for cookies to return", domain)
        cookies_by_path = self._cookies[domain]
        for path in cookies_by_path.keys():
            if not self._policy.path_return_ok(path, request):
                continue
            cookies_by_name = cookies_by_path[path]
            for cookie in cookies_by_name.values():
                if not self._policy.return_ok(cookie, request):
                    _debug("   not returning cookie")
                    continue
                _debug("   it's a match")
                cookies.append(cookie)
        return cookies

    def _cookies_for_request(self, request):
        """Return a list of cookies to be returned to server."""
        cookies = []
        for domain in self._cookies.keys():
            cookies.extend(self._cookies_for_domain(domain, request))
        return cookies

    def _cookie_attrs(self, cookies):
        """Return a list of cookie-attributes to be returned to server.

        like ['foo="bar"; $Path="/"', ...]

        The $Version attribute is also added when appropriate (currently only
        once per request).

        """
        # add cookies in order of most specific (ie. longest) path first
        cookies.sort(key=lambda arg: len(arg.path), reverse=True)

        version_set = False

        attrs = []
        for cookie in cookies:
            # set version of Cookie header
            # XXX
            # What should it be if multiple matching Set-Cookie headers have
            #  different versions themselves?
            # Answer: there is no answer; was supposed to be settled by
            #  RFC 2965 errata, but that may never appear...
            version = cookie.version
            if not version_set:
                version_set = True
                if version > 0:
                    attrs.append("$Version=%s" % version)

            # quote cookie value if necessary
            # (not for Netscape protocol, which already has any quotes
            #  intact, due to the poorly-specified Netscape Cookie: syntax)
            if ((cookie.value is not None) and
                self.non_word_re.search(cookie.value) and version > 0):
                value = self.quote_re.sub(r"\\\1", cookie.value)
            else:
                value = cookie.value

            # add cookie-attributes to be returned in Cookie header
            if cookie.value is None:
                attrs.append(cookie.name)
            else:
                attrs.append("%s=%s" % (cookie.name, value))
            if version > 0:
                if cookie.path_specified:
                    attrs.append('$Path="%s"' % cookie.path)
                if cookie.domain.startswith("."):
                    domain = cookie.domain
                    if (not cookie.domain_initial_dot and
                        domain.startswith(".")):
                        domain = domain[1:]
                    attrs.append('$Domain="%s"' % domain)
                if cookie.port is not None:
                    p = "$Port"
                    if cookie.port_specified:
                        p = p + ('="%s"' % cookie.port)
                    attrs.append(p)

        return attrs

    def add_cookie_header(self, request):
        """Add correct Cookie: header to request (urllib2.Request object).

        The Cookie2 header is also added unless policy.hide_cookie2 is true.

        """
        _debug("add_cookie_header")
        self._cookies_lock.acquire()
        try:

            self._policy._now = self._now = int(time.time())

            cookies = self._cookies_for_request(request)

            attrs = self._cookie_attrs(cookies)
            if attrs:
                if not request.has_header("Cookie"):
                    request.add_unredirected_header(
                        "Cookie", "; ".join(attrs))

            # if necessary, advertise that we know RFC 2965
            if (self._policy.rfc2965 and not self._policy.hide_cookie2 and
                not request.has_header("Cookie2")):
                for cookie in cookies:
                    if cookie.version != 1:
                        request.add_unredirected_header("Cookie2", '$Version="1"')
                        break

        finally:
            self._cookies_lock.release()

        self.clear_expired_cookies()

    def _normalized_cookie_tuples(self, attrs_set):
        """Return list of tuples containing normalised cookie information.

        attrs_set is the list of lists of key,value pairs extracted from
        the Set-Cookie or Set-Cookie2 headers.

        Tuples are name, value, standard, rest, where name and value are the
        cookie name and value, standard is a dictionary containing the standard
        cookie-attributes (discard, secure, version, expires or max-age,
        domain, path and port) and rest is a dictionary containing the rest of
        the cookie-attributes.

        """
        cookie_tuples = []

        boolean_attrs = "discard", "secure"
        value_attrs = ("version",
                       "expires", "max-age",
                       "domain", "path", "port",
                       "comment", "commenturl")

        for cookie_attrs in attrs_set:
            name, value = cookie_attrs[0]

            # Build dictionary of standard cookie-attributes (standard) and
            # dictionary of other cookie-attributes (rest).

            # Note: expiry time is normalised to seconds since epoch.  V0
            # cookies should have the Expires cookie-attribute, and V1 cookies
            # should have Max-Age, but since V1 includes RFC 2109 cookies (and
            # since V0 cookies may be a mish-mash of Netscape and RFC 2109), we
            # accept either (but prefer Max-Age).
            max_age_set = False

            bad_cookie = False

            standard = {}
            rest = {}
            for k, v in cookie_attrs[1:]:
                lc = k.lower()
                # don't lose case distinction for unknown fields
                if lc in value_attrs or lc in boolean_attrs:
                    k = lc
                if k in boolean_attrs and v is None:
                    # boolean cookie-attribute is present, but has no value
                    # (like "discard", rather than "port=80")
                    v = True
                if k in standard:
                    # only first value is significant
                    continue
                if k == "domain":
                    if v is None:
                        _debug("   missing value for domain attribute")
                        bad_cookie = True
                        break
                    # RFC 2965 section 3.3.3
                    v = v.lower()
                if k == "expires":
                    if max_age_set:
                        # Prefer max-age to expires (like Mozilla)
                        continue
                    if v is None:
                        _debug("   missing or invalid value for expires "
                              "attribute: treating as session cookie")
                        continue
                if k == "max-age":
                    max_age_set = True
                    try:
                        v = int(v)
                    except ValueError:
                        _debug("   missing or invalid (non-numeric) value for "
                              "max-age attribute")
                        bad_cookie = True
                        break
                    # convert RFC 2965 Max-Age to seconds since epoch
                    # XXX Strictly you're supposed to follow RFC 2616
                    #   age-calculation rules.  Remember that zero Max-Age is a
                    #   is a request to discard (old and new) cookie, though.
                    k = "expires"
                    v = self._now + v
                if (k in value_attrs) or (k in boolean_attrs):
                    if (v is None and
                        k not in ("port", "comment", "commenturl")):
                        _debug("   missing value for %s attribute" % k)
                        bad_cookie = True
                        break
                    standard[k] = v
                else:
                    rest[k] = v

            if bad_cookie:
                continue

            cookie_tuples.append((name, value, standard, rest))

        return cookie_tuples

    def _cookie_from_cookie_tuple(self, tup, request):
        # standard is dict of standard cookie-attributes, rest is dict of the
        # rest of them
        name, value, standard, rest = tup

        domain = standard.get("domain", Absent)
        path = standard.get("path", Absent)
        port = standard.get("port", Absent)
        expires = standard.get("expires", Absent)

        # set the easy defaults
        version = standard.get("version", None)
        if version is not None:
            try:
                version = int(version)
            except ValueError:
                return None  # invalid version, ignore cookie
        secure = standard.get("secure", False)
        # (discard is also set if expires is Absent)
        discard = standard.get("discard", False)
        comment = standard.get("comment", None)
        comment_url = standard.get("commenturl", None)

        # set default path
        if path is not Absent and path != "":
            path_specified = True
            path = escape_path(path)
        else:
            path_specified = False
            path = request_path(request)
            i = path.rfind("/")
            if i != -1:
                if version == 0:
                    # Netscape spec parts company from reality here
                    path = path[:i]
                else:
                    path = path[:i+1]
            if len(path) == 0: path = "/"

        # set default domain
        domain_specified = domain is not Absent
        # but first we have to remember whether it starts with a dot
        domain_initial_dot = False
        if domain_specified:
            domain_initial_dot = bool(domain.startswith("."))
        if domain is Absent:
            req_host, erhn = eff_request_host(request)
            domain = erhn
        elif not domain.startswith("."):
            domain = "."+domain

        # set default port
        port_specified = False
        if port is not Absent:
            if port is None:
                # Port attr present, but has no value: default to request port.
                # Cookie should then only be sent back on that port.
                port = request_port(request)
            else:
                port_specified = True
                port = re.sub(r"\s+", "", port)
        else:
            # No port attr present.  Cookie can be sent back on any port.
            port = None

        # set default expires and discard
        if expires is Absent:
            expires = None
            discard = True
        elif expires <= self._now:
            # Expiry date in past is request to delete cookie.  This can't be
            # in DefaultCookiePolicy, because can't delete cookies there.
            try:
                self.clear(domain, path, name)
            except KeyError:
                pass
            _debug("Expiring cookie, domain='%s', path='%s', name='%s'",
                   domain, path, name)
            return None

        return Cookie(version,
                      name, value,
                      port, port_specified,
                      domain, domain_specified, domain_initial_dot,
                      path, path_specified,
                      secure,
                      expires,
                      discard,
                      comment,
                      comment_url,
                      rest)

    def _cookies_from_attrs_set(self, attrs_set, request):
        cookie_tuples = self._normalized_cookie_tuples(attrs_set)

        cookies = []
        for tup in cookie_tuples:
            cookie = self._cookie_from_cookie_tuple(tup, request)
            if cookie: cookies.append(cookie)
        return cookies

    def _process_rfc2109_cookies(self, cookies):
        rfc2109_as_ns = getattr(self._policy, 'rfc2109_as_netscape', None)
        if rfc2109_as_ns is None:
            rfc2109_as_ns = not self._policy.rfc2965
        for cookie in cookies:
            if cookie.version == 1:
                cookie.rfc2109 = True
                if rfc2109_as_ns:
                    # treat 2109 cookies as Netscape cookies rather than
                    # as RFC2965 cookies
                    cookie.version = 0

    def make_cookies(self, response, request):
        """Return sequence of Cookie objects extracted from response object."""
        # get cookie-attributes for RFC 2965 and Netscape protocols
        headers = response.info()
        rfc2965_hdrs = headers.getheaders("Set-Cookie2")
        ns_hdrs = headers.getheaders("Set-Cookie")

        rfc2965 = self._policy.rfc2965
        netscape = self._policy.netscape

        if ((not rfc2965_hdrs and not ns_hdrs) or
            (not ns_hdrs and not rfc2965) or
            (not rfc2965_hdrs and not netscape) or
            (not netscape and not rfc2965)):
            return []  # no relevant cookie headers: quick exit

        try:
            cookies = self._cookies_from_attrs_set(
                split_header_words(rfc2965_hdrs), request)
        except Exception:
            _warn_unhandled_exception()
            cookies = []

        if ns_hdrs and netscape:
            try:
                # RFC 2109 and Netscape cookies
                ns_cookies = self._cookies_from_attrs_set(
                    parse_ns_headers(ns_hdrs), request)
            except Exception:
                _warn_unhandled_exception()
                ns_cookies = []
            self._process_rfc2109_cookies(ns_cookies)

            # Look for Netscape cookies (from Set-Cookie headers) that match
            # corresponding RFC 2965 cookies (from Set-Cookie2 headers).
            # For each match, keep the RFC 2965 cookie and ignore the Netscape
            # cookie (RFC 2965 section 9.1).  Actually, RFC 2109 cookies are
            # bundled in with the Netscape cookies for this purpose, which is
            # reasonable behaviour.
            if rfc2965:
                lookup = {}
                for cookie in cookies:
                    lookup[(cookie.domain, cookie.path, cookie.name)] = None

                def no_matching_rfc2965(ns_cookie, lookup=lookup):
                    key = ns_cookie.domain, ns_cookie.path, ns_cookie.name
                    return key not in lookup
                ns_cookies = filter(no_matching_rfc2965, ns_cookies)

            if ns_cookies:
                cookies.extend(ns_cookies)

        return cookies

    def set_cookie_if_ok(self, cookie, request):
        """Set a cookie if policy says it's OK to do so."""
        self._cookies_lock.acquire()
        try:
            self._policy._now = self._now = int(time.time())

            if self._policy.set_ok(cookie, request):
                self.set_cookie(cookie)


        finally:
            self._cookies_lock.release()

    def set_cookie(self, cookie):
        """Set a cookie, without checking whether or not it should be set."""
        c = self._cookies
        self._cookies_lock.acquire()
        try:
            if cookie.domain not in c: c[cookie.domain] = {}
            c2 = c[cookie.domain]
            if cookie.path not in c2: c2[cookie.path] = {}
            c3 = c2[cookie.path]
            c3[cookie.name] = cookie
        finally:
            self._cookies_lock.release()

    def extract_cookies(self, response, request):
        """Extract cookies from response, where allowable given the request."""
        _debug("extract_cookies: %s", response.info())
        self._cookies_lock.acquire()
        try:
            self._policy._now = self._now = int(time.time())

            for cookie in self.make_cookies(response, request):
                if self._policy.set_ok(cookie, request):
                    _debug(" setting cookie: %s", cookie)
                    self.set_cookie(cookie)
        finally:
            self._cookies_lock.release()

    def clear(self, domain=None, path=None, name=None):
        """Clear some cookies.

        Invoking this method without arguments will clear all cookies.  If
        given a single argument, only cookies belonging to that domain will be
        removed.  If given two arguments, cookies belonging to the specified
        path within that domain are removed.  If given three arguments, then
        the cookie with the specified name, path and domain is removed.

        Raises KeyError if no matching cookie exists.

        """
        if name is not None:
            if (domain is None) or (path is None):
                raise ValueError(
                    "domain and path must be given to remove a cookie by name")
            del self._cookies[domain][path][name]
        elif path is not None:
            if domain is None:
                raise ValueError(
                    "domain must be given to remove cookies by path")
            del self._cookies[domain][path]
        elif domain is not None:
            del self._cookies[domain]
        else:
            self._cookies = {}

    def clear_session_cookies(self):
        """Discard all session cookies.

        Note that the .save() method won't save session cookies anyway, unless
        you ask otherwise by passing a true ignore_discard argument.

        """
        self._cookies_lock.acquire()
        try:
            for cookie in self:
                if cookie.discard:
                    self.clear(cookie.domain, cookie.path, cookie.name)
        finally:
            self._cookies_lock.release()

    def clear_expired_cookies(self):
        """Discard all expired cookies.

        You probably don't need to call this method: expired cookies are never
        sent back to the server (provided you're using DefaultCookiePolicy),
        this method is called by CookieJar itself every so often, and the
        .save() method won't save expired cookies anyway (unless you ask
        otherwise by passing a true ignore_expires argument).

        """
        self._cookies_lock.acquire()
        try:
            now = time.time()
            for cookie in self:
                if cookie.is_expired(now):
                    self.clear(cookie.domain, cookie.path, cookie.name)
        finally:
            self._cookies_lock.release()

    def __iter__(self):
        return deepvalues(self._cookies)

    def __len__(self):
        """Return number of contained cookies."""
        i = 0
        for cookie in self: i = i + 1
        return i

    def __repr__(self):
        r = []
        for cookie in self: r.append(repr(cookie))
        return "<%s[%s]>" % (self.__class__, ", ".join(r))

    def __str__(self):
        r = []
        for cookie in self: r.append(str(cookie))
        return "<%s[%s]>" % (self.__class__, ", ".join(r))


# derives from IOError for backwards-compatibility with Python 2.4.0
class LoadError(IOError): pass

class FileCookieJar(CookieJar):
    """CookieJar that can be loaded from and saved to a file."""

    def __init__(self, filename=None, delayload=False, policy=None):
        """
        Cookies are NOT loaded from the named file until either the .load() or
        .revert() method is called.

        """
        CookieJar.__init__(self, policy)
        if filename is not None:
            try:
                filename+""
            except:
                raise ValueError("filename must be string-like")
        self.filename = filename
        self.delayload = bool(delayload)

    def save(self, filename=None, ignore_discard=False, ignore_expires=False):
        """Save cookies to a file."""
        raise NotImplementedError()

    def load(self, filename=None, ignore_discard=False, ignore_expires=False):
        """Load cookies from a file."""
        if filename is None:
            if self.filename is not None: filename = self.filename
            else: raise ValueError(MISSING_FILENAME_TEXT)

        f = open(filename)
        try:
            self._really_load(f, filename, ignore_discard, ignore_expires)
        finally:
            f.close()

    def revert(self, filename=None,
               ignore_discard=False, ignore_expires=False):
        """Clear all cookies and reload cookies from a saved file.

        Raises LoadError (or IOError) if reversion is not successful; the
        object's state will not be altered if this happens.

        """
        if filename is None:
            if self.filename is not None: filename = self.filename
            else: raise ValueError(MISSING_FILENAME_TEXT)

        self._cookies_lock.acquire()
        try:

            old_state = copy.deepcopy(self._cookies)
            self._cookies = {}
            try:
                self.load(filename, ignore_discard, ignore_expires)
            except (LoadError, IOError):
                self._cookies = old_state
                raise

        finally:
            self._cookies_lock.release()

from _LWPCookieJar import LWPCookieJar, lwp_cookie_str
from _MozillaCookieJar import MozillaCookieJar

Filemanager

Name Type Size Permission Actions
Demo Folder 0755
Doc Folder 0755
Tools Folder 0755
bsddb Folder 0755
compiler Folder 0755
config Folder 0755
ctypes Folder 0755
curses Folder 0755
distutils Folder 0755
email Folder 0755
encodings Folder 0755
hotshot Folder 0755
idlelib Folder 0755
importlib Folder 0755
json Folder 0755
lib-dynload Folder 0755
lib-tk Folder 0755
lib2to3 Folder 0755
logging Folder 0755
multiprocessing Folder 0755
plat-linux2 Folder 0755
pydoc_data Folder 0755
site-packages Folder 0755
sqlite3 Folder 0755
test Folder 0755
unittest Folder 0755
wsgiref Folder 0755
xml Folder 0755
.BaseHTTPServer.pyo.40009 File 21.18 KB 0644
.Bastion.pyo.40009 File 6.5 KB 0644
.CGIHTTPServer.pyo.40009 File 10.84 KB 0644
.ConfigParser.pyo.40009 File 24.62 KB 0644
.Cookie.pyo.40009 File 21.89 KB 0644
.MimeWriter.pyo.40009 File 7.19 KB 0644
.Queue.pyo.40009 File 9.19 KB 0644
.SimpleHTTPServer.pyo.40009 File 7.55 KB 0644
.SimpleXMLRPCServer.pyo.40009 File 22.31 KB 0644
.SocketServer.pyo.40009 File 23.49 KB 0644
.StringIO.pyo.40009 File 11.21 KB 0644
.UserDict.pyo.40009 File 8.61 KB 0644
.UserList.pyo.40009 File 6.42 KB 0644
.UserString.pyo.40009 File 14.52 KB 0644
._LWPCookieJar.pyo.40009 File 5.4 KB 0644
.__future__.pyo.40009 File 4.13 KB 0644
.__phello__.foo.pyo.40009 File 125 B 0644
._abcoll.pyo.40009 File 24.4 KB 0644
._osx_support.pyo.40009 File 11.28 KB 0644
._pyio.pyo.40009 File 62.71 KB 0644
._strptime.pyo.40009 File 14.53 KB 0644
._sysconfigdata.pyo.40009 File 20.72 KB 0644
._threading_local.pyo.40009 File 6.45 KB 0644
._weakrefset.pyo.40009 File 9.25 KB 0644
.aifc.pyo.40009 File 29.31 KB 0644
.antigravity.pyo.40009 File 203 B 0644
.anydbm.pyo.40009 File 2.73 KB 0644
.ast.pyo.40009 File 12.65 KB 0644
.asynchat.pyo.40009 File 8.44 KB 0644
.asyncore.pyo.40009 File 18.4 KB 0644
.atexit.pyo.40009 File 2.15 KB 0644
.audiodev.pyo.40009 File 8.27 KB 0644
.base64.pyo.40009 File 10.63 KB 0644
.bdb.pyo.40009 File 18.65 KB 0644
.binhex.pyo.40009 File 15.04 KB 0644
.bisect.pyo.40009 File 3 KB 0644
.cProfile.pyo.40009 File 6.25 KB 0644
.calendar.pyo.40009 File 27.13 KB 0644
.cgi.pyo.40009 File 31.71 KB 0644
.cgitb.pyo.40009 File 11.9 KB 0644
.chunk.pyo.40009 File 5.46 KB 0644
.cmd.pyo.40009 File 13.71 KB 0644
.code.pyo.40009 File 10.09 KB 0644
.codecs.pyo.40009 File 35.74 KB 0644
.codeop.pyo.40009 File 6.44 KB 0644
.colorsys.pyo.40009 File 3.9 KB 0644
.commands.pyo.40009 File 2.41 KB 0644
.compileall.pyo.40009 File 6.85 KB 0644
.contextlib.pyo.40009 File 4.35 KB 0644
.crypt.pyo.40009 File 2.89 KB 0644
.csv.pyo.40009 File 13.14 KB 0644
.dbhash.pyo.40009 File 718 B 0644
.decimal.pyo.40009 File 167.33 KB 0644
.dircache.pyo.40009 File 1.54 KB 0644
.dis.pyo.40009 File 6.08 KB 0644
.dumbdbm.pyo.40009 File 6.41 KB 0644
.dummy_thread.pyo.40009 File 5.27 KB 0644
.dummy_threading.pyo.40009 File 1.25 KB 0644
.filecmp.pyo.40009 File 9.4 KB 0644
.fileinput.pyo.40009 File 14.48 KB 0644
.fnmatch.pyo.40009 File 3.45 KB 0644
.formatter.pyo.40009 File 18.73 KB 0644
.fpformat.pyo.40009 File 4.56 KB 0644
.fractions.pyo.40009 File 19.27 KB 0644
.ftplib.pyo.40009 File 33.38 KB 0644
.functools.pyo.40009 File 5.95 KB 0644
.genericpath.pyo.40009 File 3.19 KB 0644
.getpass.pyo.40009 File 4.63 KB 0644
.gettext.pyo.40009 File 15.19 KB 0644
.glob.pyo.40009 File 2.83 KB 0644
.gzip.pyo.40009 File 14.72 KB 0644
.hashlib.pyo.40009 File 6.74 KB 0644
.heapq.pyo.40009 File 14.13 KB 0644
.hmac.pyo.40009 File 4.44 KB 0644
.htmlentitydefs.pyo.40009 File 6.22 KB 0644
.htmllib.pyo.40009 File 19.83 KB 0644
.ihooks.pyo.40009 File 20.87 KB 0644
.imghdr.pyo.40009 File 4.73 KB 0644
.inspect.pyo.40009 File 39.04 KB 0644
.io.pyo.40009 File 3.4 KB 0644
.keyword.pyo.40009 File 2.06 KB 0644
.linecache.pyo.40009 File 3.14 KB 0644
.locale.pyo.40009 File 48.77 KB 0644
.macpath.pyo.40009 File 7.47 KB 0644
.macurl2path.pyo.40009 File 2.71 KB 0644
.mailcap.pyo.40009 File 6.92 KB 0644
.md5.pyo.40009 File 378 B 0644
.mhlib.pyo.40009 File 33.01 KB 0644
.mimetools.pyo.40009 File 8.03 KB 0644
.mimetypes.pyo.40009 File 17.86 KB 0644
.mimify.pyo.40009 File 11.71 KB 0644
.mutex.pyo.40009 File 2.46 KB 0644
.netrc.pyo.40009 File 3.83 KB 0644
.new.pyo.40009 File 862 B 0644
.nntplib.pyo.40009 File 20.55 KB 0644
.nturl2path.pyo.40009 File 1.77 KB 0644
.numbers.pyo.40009 File 13.68 KB 0644
.opcode.pyo.40009 File 6 KB 0644
.os.pyo.40009 File 24.96 KB 0644
.os2emxpath.pyo.40009 File 4.39 KB 0644
.pdb.pyo.40009 File 42.59 KB 0644
.pipes.pyo.40009 File 9.09 KB 0644
.pkgutil.pyo.40009 File 18.49 KB 0644
.platform.pyo.40009 File 36.04 KB 0644
.poplib.pyo.40009 File 13.03 KB 0644
.posixfile.pyo.40009 File 7.47 KB 0644
.posixpath.pyo.40009 File 11.03 KB 0644
.pstats.pyo.40009 File 24.43 KB 0644
.pty.pyo.40009 File 4.85 KB 0644
.py_compile.pyo.40009 File 6.27 KB 0644
.pyclbr.pyo.40009 File 9.42 KB 0644
.quopri.pyo.40009 File 6.42 KB 0644
.random.pyo.40009 File 24.99 KB 0644
.re.pyo.40009 File 12.79 KB 0644
.repr.pyo.40009 File 5.26 KB 0644
.rexec.pyo.40009 File 23.58 KB 0644
.rfc822.pyo.40009 File 31.05 KB 0644
.rlcompleter.pyo.40009 File 5.84 KB 0644
.robotparser.pyo.40009 File 7.7 KB 0644
.runpy.pyo.40009 File 8.21 KB 0644
.sched.pyo.40009 File 4.88 KB 0644
.sets.pyo.40009 File 16.5 KB 0644
.sgmllib.pyo.40009 File 15.07 KB 0644
.sha.pyo.40009 File 421 B 0644
.shelve.pyo.40009 File 10.03 KB 0644
.shlex.pyo.40009 File 7.37 KB 0644
.shutil.pyo.40009 File 18.1 KB 0644
.site.pyo.40009 File 19.11 KB 0644
.smtpd.pyo.40009 File 15.52 KB 0644
.smtplib.pyo.40009 File 29.29 KB 0644
.sndhdr.pyo.40009 File 7.18 KB 0644
.sre.pyo.40009 File 519 B 0644
.sre_constants.pyo.40009 File 5.97 KB 0644
.sre_parse.pyo.40009 File 18.98 KB 0644
.ssl.pyo.40009 File 31.51 KB 0644
.stat.pyo.40009 File 2.69 KB 0644
.statvfs.pyo.40009 File 620 B 0644
.string.pyo.40009 File 19.54 KB 0644
.stringold.pyo.40009 File 12.25 KB 0644
.struct.pyo.40009 File 239 B 0644
.subprocess.pyo.40009 File 40.93 KB 0644
.sunau.pyo.40009 File 17.53 KB 0644
.sunaudio.pyo.40009 File 1.94 KB 0644
.symbol.pyo.40009 File 2.96 KB 0644
.sysconfig.pyo.40009 File 17.23 KB 0644
.tabnanny.pyo.40009 File 8.05 KB 0644
.tarfile.pyo.40009 File 73.44 KB 0644
.telnetlib.pyo.40009 File 22.53 KB 0644
.tempfile.pyo.40009 File 19.35 KB 0644
.this.pyo.40009 File 1.19 KB 0644
.timeit.pyo.40009 File 11.5 KB 0644
.toaiff.pyo.40009 File 3.03 KB 0644
.token.pyo.40009 File 3.73 KB 0644
.traceback.pyo.40009 File 11.35 KB 0644
.tty.pyo.40009 File 1.29 KB 0644
.types.pyo.40009 File 2.45 KB 0644
.urlparse.pyo.40009 File 14.73 KB 0644
.user.pyo.40009 File 1.68 KB 0644
.uu.pyo.40009 File 4.21 KB 0644
.uuid.pyo.40009 File 20.68 KB 0644
.weakref.pyo.40009 File 13.72 KB 0644
.whichdb.pyo.40009 File 2.19 KB 0644
.xdrlib.pyo.40009 File 9.07 KB 0644
.xmllib.pyo.40009 File 26.22 KB 0644
.zipfile.pyo.40009 File 40.33 KB 0644
BaseHTTPServer.py File 21.93 KB 0644
BaseHTTPServer.pyc File 21.18 KB 0644
BaseHTTPServer.pyo File 21.18 KB 0644
Bastion.py File 5.61 KB 0644
Bastion.pyc File 6.5 KB 0644
Bastion.pyo File 6.5 KB 0644
CGIHTTPServer.py File 12.84 KB 0644
CGIHTTPServer.pyc File 10.84 KB 0644
CGIHTTPServer.pyo File 10.84 KB 0644
ConfigParser.py File 27.1 KB 0644
ConfigParser.pyc File 24.62 KB 0644
ConfigParser.pyo File 24.62 KB 0644
Cookie.py File 24.66 KB 0644
Cookie.pyc File 21.64 KB 0644
Cookie.pyo File 21.64 KB 0644
DocXMLRPCServer.py File 10.52 KB 0644
DocXMLRPCServer.pyc File 9.96 KB 0644
DocXMLRPCServer.pyo File 9.85 KB 0644
HTMLParser.py File 16.58 KB 0644
HTMLParser.pyc File 13.39 KB 0644
HTMLParser.pyo File 13.1 KB 0644
MimeWriter.py File 6.33 KB 0644
MimeWriter.pyc File 7.19 KB 0644
MimeWriter.pyo File 7.19 KB 0644
Queue.py File 8.36 KB 0644
Queue.pyc File 9.19 KB 0644
Queue.pyo File 9.19 KB 0644
SimpleHTTPServer.py File 7.25 KB 0644
SimpleHTTPServer.pyc File 7.55 KB 0644
SimpleHTTPServer.pyo File 7.55 KB 0644
SimpleXMLRPCServer.py File 25.17 KB 0644
SimpleXMLRPCServer.pyc File 22.31 KB 0644
SimpleXMLRPCServer.pyo File 22.31 KB 0644
SocketServer.py File 23.29 KB 0644
SocketServer.pyc File 23.49 KB 0644
SocketServer.pyo File 23.49 KB 0644
StringIO.py File 10.41 KB 0644
StringIO.pyc File 11.21 KB 0644
StringIO.pyo File 11.21 KB 0644
UserDict.py File 5.67 KB 0644
UserDict.pyc File 8.61 KB 0644
UserDict.pyo File 8.61 KB 0644
UserList.py File 3.56 KB 0644
UserList.pyc File 6.42 KB 0644
UserList.pyo File 6.42 KB 0644
UserString.py File 9.46 KB 0755
UserString.pyc File 14.52 KB 0644
UserString.pyo File 14.52 KB 0644
_LWPCookieJar.py File 6.4 KB 0644
_LWPCookieJar.pyc File 5.4 KB 0644
_LWPCookieJar.pyo File 5.4 KB 0644
_MozillaCookieJar.py File 5.67 KB 0644
_MozillaCookieJar.pyc File 4.37 KB 0644
_MozillaCookieJar.pyo File 4.33 KB 0644
__future__.py File 4.28 KB 0644
__future__.pyc File 4.13 KB 0644
__future__.pyo File 4.13 KB 0644
__phello__.foo.py File 64 B 0644
__phello__.foo.pyc File 125 B 0644
__phello__.foo.pyo File 125 B 0644
_abcoll.py File 17.45 KB 0644
_abcoll.pyc File 24.4 KB 0644
_abcoll.pyo File 24.4 KB 0644
_osx_support.py File 18.03 KB 0644
_osx_support.pyc File 11.28 KB 0644
_osx_support.pyo File 11.28 KB 0644
_pyio.py File 67.24 KB 0644
_pyio.pyc File 62.71 KB 0644
_pyio.pyo File 62.71 KB 0644
_strptime.py File 19.75 KB 0644
_strptime.pyc File 14.53 KB 0644
_strptime.pyo File 14.53 KB 0644
_sysconfigdata.py File 17.56 KB 0644
_sysconfigdata.pyc File 20.72 KB 0644
_sysconfigdata.pyo File 20.72 KB 0644
_threading_local.py File 7.28 KB 0644
_threading_local.pyc File 6.45 KB 0644
_threading_local.pyo File 6.45 KB 0644
_weakrefset.py File 5.48 KB 0644
_weakrefset.pyc File 9.25 KB 0644
_weakrefset.pyo File 9.25 KB 0644
abc.py File 6.98 KB 0644
abc.pyc File 6 KB 0644
abc.pyo File 5.94 KB 0644
aifc.py File 32.94 KB 0644
aifc.pyc File 29.31 KB 0644
aifc.pyo File 29.31 KB 0644
antigravity.py File 60 B 0644
antigravity.pyc File 203 B 0644
antigravity.pyo File 203 B 0644
anydbm.py File 2.6 KB 0644
anydbm.pyc File 2.73 KB 0644
anydbm.pyo File 2.73 KB 0644
argparse.py File 86.46 KB 0644
argparse.pyc File 62.57 KB 0644
argparse.pyo File 62.41 KB 0644
ast.py File 11.53 KB 0644
ast.pyc File 12.65 KB 0644
ast.pyo File 12.65 KB 0644
asynchat.py File 11.13 KB 0644
asynchat.pyc File 8.44 KB 0644
asynchat.pyo File 8.44 KB 0644
asyncore.py File 20.36 KB 0644
asyncore.pyc File 18.4 KB 0644
asyncore.pyo File 18.4 KB 0644
atexit.py File 1.67 KB 0644
atexit.pyc File 2.15 KB 0644
atexit.pyo File 2.15 KB 0644
audiodev.py File 7.42 KB 0644
audiodev.pyc File 8.27 KB 0644
audiodev.pyo File 8.27 KB 0644
base64.py File 11.09 KB 0755
base64.pyc File 10.63 KB 0644
base64.pyo File 10.63 KB 0644
bdb.py File 21.21 KB 0644
bdb.pyc File 18.65 KB 0644
bdb.pyo File 18.65 KB 0644
binhex.py File 14.14 KB 0644
binhex.pyc File 15.04 KB 0644
binhex.pyo File 15.04 KB 0644
bisect.py File 2.53 KB 0644
bisect.pyc File 3 KB 0644
bisect.pyo File 3 KB 0644
cProfile.py File 6.43 KB 0755
cProfile.pyc File 6.25 KB 0644
cProfile.pyo File 6.25 KB 0644
calendar.py File 22.76 KB 0644
calendar.pyc File 27.13 KB 0644
calendar.pyo File 27.13 KB 0644
cgi.py File 33.68 KB 0755
cgi.pyc File 31.71 KB 0644
cgi.pyo File 31.71 KB 0644
cgitb.py File 11.89 KB 0644
cgitb.pyc File 11.9 KB 0644
cgitb.pyo File 11.9 KB 0644
chunk.py File 5.25 KB 0644
chunk.pyc File 5.46 KB 0644
chunk.pyo File 5.46 KB 0644
cmd.py File 14.67 KB 0644
cmd.pyc File 13.71 KB 0644
cmd.pyo File 13.71 KB 0644
code.py File 9.95 KB 0644
code.pyc File 10.09 KB 0644
code.pyo File 10.09 KB 0644
codecs.py File 34.44 KB 0644
codecs.pyc File 35.74 KB 0644
codecs.pyo File 35.74 KB 0644
codeop.py File 5.86 KB 0644
codeop.pyc File 6.44 KB 0644
codeop.pyo File 6.44 KB 0644
collections.py File 25.28 KB 0644
collections.pyc File 23.99 KB 0644
collections.pyo File 23.94 KB 0644
colorsys.py File 3.6 KB 0644
colorsys.pyc File 3.9 KB 0644
colorsys.pyo File 3.9 KB 0644
commands.py File 2.49 KB 0644
commands.pyc File 2.41 KB 0644
commands.pyo File 2.41 KB 0644
compileall.py File 7.58 KB 0644
compileall.pyc File 6.85 KB 0644
compileall.pyo File 6.85 KB 0644
contextlib.py File 4.32 KB 0644
contextlib.pyc File 4.35 KB 0644
contextlib.pyo File 4.35 KB 0644
cookielib.py File 63.21 KB 0644
cookielib.pyc File 53.55 KB 0644
cookielib.pyo File 53.37 KB 0644
copy.py File 11.25 KB 0644
copy.pyc File 11.91 KB 0644
copy.pyo File 11.82 KB 0644
copy_reg.py File 6.64 KB 0644
copy_reg.pyc File 4.99 KB 0644
copy_reg.pyo File 4.95 KB 0644
crypt.py File 2.24 KB 0644
crypt.pyc File 2.89 KB 0644
crypt.pyo File 2.89 KB 0644
csv.py File 15.96 KB 0644
csv.pyc File 13.14 KB 0644
csv.pyo File 13.14 KB 0644
dbhash.py File 498 B 0644
dbhash.pyc File 718 B 0644
dbhash.pyo File 718 B 0644
decimal.py File 215.84 KB 0644
decimal.pyc File 167.33 KB 0644
decimal.pyo File 167.33 KB 0644
difflib.py File 80.42 KB 0644
difflib.pyc File 60.5 KB 0644
difflib.pyo File 60.45 KB 0644
dircache.py File 1.1 KB 0644
dircache.pyc File 1.54 KB 0644
dircache.pyo File 1.54 KB 0644
dis.py File 6.35 KB 0644
dis.pyc File 6.08 KB 0644
dis.pyo File 6.08 KB 0644
doctest.py File 102.01 KB 0644
doctest.pyc File 81.45 KB 0644
doctest.pyo File 81.17 KB 0644
dumbdbm.py File 8.61 KB 0644
dumbdbm.pyc File 6.41 KB 0644
dumbdbm.pyo File 6.41 KB 0644
dummy_thread.py File 4.31 KB 0644
dummy_thread.pyc File 5.27 KB 0644
dummy_thread.pyo File 5.27 KB 0644
dummy_threading.py File 2.74 KB 0644
dummy_threading.pyc File 1.25 KB 0644
dummy_threading.pyo File 1.25 KB 0644
filecmp.py File 9.36 KB 0644
filecmp.pyc File 9.4 KB 0644
filecmp.pyo File 9.4 KB 0644
fileinput.py File 13.81 KB 0644
fileinput.pyc File 14.48 KB 0644
fileinput.pyo File 14.48 KB 0644
fnmatch.py File 3.16 KB 0644
fnmatch.pyc File 3.45 KB 0644
fnmatch.pyo File 3.45 KB 0644
formatter.py File 14.56 KB 0644
formatter.pyc File 18.73 KB 0644
formatter.pyo File 18.73 KB 0644
fpformat.py File 4.59 KB 0644
fpformat.pyc File 4.56 KB 0644
fpformat.pyo File 4.56 KB 0644
fractions.py File 21.87 KB 0644
fractions.pyc File 19.27 KB 0644
fractions.pyo File 19.27 KB 0644
ftplib.py File 36.1 KB 0644
ftplib.pyc File 33.38 KB 0644
ftplib.pyo File 33.38 KB 0644
functools.py File 4.37 KB 0644
functools.pyc File 5.95 KB 0644
functools.pyo File 5.95 KB 0644
genericpath.py File 2.94 KB 0644
genericpath.pyc File 3.19 KB 0644
genericpath.pyo File 3.19 KB 0644
getopt.py File 7.15 KB 0644
getopt.pyc File 6.5 KB 0644
getopt.pyo File 6.45 KB 0644
getpass.py File 5.43 KB 0644
getpass.pyc File 4.63 KB 0644
getpass.pyo File 4.63 KB 0644
gettext.py File 19.47 KB 0644
gettext.pyc File 15.19 KB 0644
gettext.pyo File 15.19 KB 0644
glob.py File 2.86 KB 0644
glob.pyc File 2.83 KB 0644
glob.pyo File 2.83 KB 0644
gzip.py File 18.26 KB 0644
gzip.pyc File 14.72 KB 0644
gzip.pyo File 14.72 KB 0644
hashlib.py File 7.48 KB 0644
hashlib.pyc File 6.74 KB 0644
hashlib.pyo File 6.74 KB 0644
heapq.py File 17.76 KB 0644
heapq.pyc File 14.13 KB 0644
heapq.pyo File 14.13 KB 0644
hmac.py File 4.48 KB 0644
hmac.pyc File 4.44 KB 0644
hmac.pyo File 4.44 KB 0644
htmlentitydefs.py File 17.63 KB 0644
htmlentitydefs.pyc File 6.22 KB 0644
htmlentitydefs.pyo File 6.22 KB 0644
htmllib.py File 12.57 KB 0644
htmllib.pyc File 19.83 KB 0644
htmllib.pyo File 19.83 KB 0644
httplib.py File 51.37 KB 0644
httplib.pyc File 37.54 KB 0644
httplib.pyo File 37.37 KB 0644
ihooks.py File 18.54 KB 0644
ihooks.pyc File 20.87 KB 0644
ihooks.pyo File 20.87 KB 0644
imaplib.py File 47.14 KB 0644
imaplib.pyc File 44.28 KB 0644
imaplib.pyo File 41.63 KB 0644
imghdr.py File 3.46 KB 0644
imghdr.pyc File 4.73 KB 0644
imghdr.pyo File 4.73 KB 0644
imputil.py File 25.16 KB 0644
imputil.pyc File 15.26 KB 0644
imputil.pyo File 15.08 KB 0644
inspect.py File 41.47 KB 0644
inspect.pyc File 39.04 KB 0644
inspect.pyo File 39.04 KB 0644
io.py File 3.12 KB 0644
io.pyc File 3.4 KB 0644
io.pyo File 3.4 KB 0644
keyword.py File 1.95 KB 0755
keyword.pyc File 2.06 KB 0644
keyword.pyo File 2.06 KB 0644
linecache.py File 3.87 KB 0644
linecache.pyc File 3.14 KB 0644
linecache.pyo File 3.14 KB 0644
locale.py File 87.33 KB 0644
locale.pyc File 48.77 KB 0644
locale.pyo File 48.77 KB 0644
macpath.py File 6.11 KB 0644
macpath.pyc File 7.47 KB 0644
macpath.pyo File 7.47 KB 0644
macurl2path.py File 3.2 KB 0644
macurl2path.pyc File 2.71 KB 0644
macurl2path.pyo File 2.71 KB 0644
mailbox.py File 78.86 KB 0644
mailbox.pyc File 74.87 KB 0644
mailbox.pyo File 74.82 KB 0644
mailcap.py File 7.25 KB 0644
mailcap.pyc File 6.92 KB 0644
mailcap.pyo File 6.92 KB 0644
markupbase.py File 14.3 KB 0644
markupbase.pyc File 9.08 KB 0644
markupbase.pyo File 8.89 KB 0644
md5.py File 358 B 0644
md5.pyc File 378 B 0644
md5.pyo File 378 B 0644
mhlib.py File 32.65 KB 0644
mhlib.pyc File 33.01 KB 0644
mhlib.pyo File 33.01 KB 0644
mimetools.py File 7 KB 0644
mimetools.pyc File 8.03 KB 0644
mimetools.pyo File 8.03 KB 0644
mimetypes.py File 20.22 KB 0644
mimetypes.pyc File 17.86 KB 0644
mimetypes.pyo File 17.86 KB 0644
mimify.py File 14.67 KB 0755
mimify.pyc File 11.71 KB 0644
mimify.pyo File 11.71 KB 0644
modulefinder.py File 23.71 KB 0644
modulefinder.pyc File 18.27 KB 0644
modulefinder.pyo File 18.19 KB 0644
multifile.py File 4.71 KB 0644
multifile.pyc File 5.29 KB 0644
multifile.pyo File 5.25 KB 0644
mutex.py File 1.83 KB 0644
mutex.pyc File 2.46 KB 0644
mutex.pyo File 2.46 KB 0644
netrc.py File 4.47 KB 0644
netrc.pyc File 3.83 KB 0644
netrc.pyo File 3.83 KB 0644
new.py File 610 B 0644
new.pyc File 862 B 0644
new.pyo File 862 B 0644
nntplib.py File 20.97 KB 0644
nntplib.pyc File 20.55 KB 0644
nntplib.pyo File 20.55 KB 0644
ntpath.py File 18.02 KB 0644
ntpath.pyc File 11.6 KB 0644
ntpath.pyo File 11.56 KB 0644
nturl2path.py File 2.32 KB 0644
nturl2path.pyc File 1.77 KB 0644
nturl2path.pyo File 1.77 KB 0644
numbers.py File 10.08 KB 0644
numbers.pyc File 13.68 KB 0644
numbers.pyo File 13.68 KB 0644
opcode.py File 5.35 KB 0644
opcode.pyc File 6 KB 0644
opcode.pyo File 6 KB 0644
optparse.py File 59.69 KB 0644
optparse.pyc File 52.78 KB 0644
optparse.pyo File 52.7 KB 0644
os.py File 25.17 KB 0644
os.pyc File 24.96 KB 0644
os.pyo File 24.96 KB 0644
os2emxpath.py File 4.5 KB 0644
os2emxpath.pyc File 4.39 KB 0644
os2emxpath.pyo File 4.39 KB 0644
pdb.doc File 7.73 KB 0644
pdb.py File 44.94 KB 0755
pdb.pyc File 42.59 KB 0644
pdb.pyo File 42.59 KB 0644
pickle.py File 44.09 KB 0644
pickle.pyc File 37.56 KB 0644
pickle.pyo File 37.37 KB 0644
pickletools.py File 72.79 KB 0644
pickletools.pyc File 55.77 KB 0644
pickletools.pyo File 54.95 KB 0644
pipes.py File 9.36 KB 0644
pipes.pyc File 9.09 KB 0644
pipes.pyo File 9.09 KB 0644
pkgutil.py File 19.87 KB 0644
pkgutil.pyc File 18.49 KB 0644
pkgutil.pyo File 18.49 KB 0644
platform.py File 51.97 KB 0755
platform.pyc File 36.04 KB 0644
platform.pyo File 36.04 KB 0644
plistlib.py File 15.44 KB 0644
plistlib.pyc File 19.52 KB 0644
plistlib.pyo File 19.44 KB 0644
popen2.py File 8.22 KB 0644
popen2.pyc File 8.81 KB 0644
popen2.pyo File 8.77 KB 0644
poplib.py File 12.52 KB 0644
poplib.pyc File 13.03 KB 0644
poplib.pyo File 13.03 KB 0644
posixfile.py File 7.82 KB 0644
posixfile.pyc File 7.47 KB 0644
posixfile.pyo File 7.47 KB 0644
posixpath.py File 13.27 KB 0644
posixpath.pyc File 11.03 KB 0644
posixpath.pyo File 11.03 KB 0644
pprint.py File 11.73 KB 0644
pprint.pyc File 10.06 KB 0644
pprint.pyo File 9.89 KB 0644
profile.py File 22.25 KB 0755
profile.pyc File 16.07 KB 0644
profile.pyo File 15.83 KB 0644
pstats.py File 26.08 KB 0644
pstats.pyc File 24.43 KB 0644
pstats.pyo File 24.43 KB 0644
pty.py File 4.94 KB 0644
pty.pyc File 4.85 KB 0644
pty.pyo File 4.85 KB 0644
py_compile.py File 5.79 KB 0644
py_compile.pyc File 6.27 KB 0644
py_compile.pyo File 6.27 KB 0644
pyclbr.py File 13.07 KB 0644
pyclbr.pyc File 9.42 KB 0644
pyclbr.pyo File 9.42 KB 0644
pydoc.py File 91.12 KB 0755
pydoc.pyc File 88.35 KB 0644
pydoc.pyo File 88.29 KB 0644
quopri.py File 6.81 KB 0755
quopri.pyc File 6.42 KB 0644
quopri.pyo File 6.42 KB 0644
random.py File 31.45 KB 0644
random.pyc File 24.99 KB 0644
random.pyo File 24.99 KB 0644
re.py File 12.66 KB 0644
re.pyc File 12.79 KB 0644
re.pyo File 12.79 KB 0644
repr.py File 4.2 KB 0644
repr.pyc File 5.26 KB 0644
repr.pyo File 5.26 KB 0644
rexec.py File 19.68 KB 0644
rexec.pyc File 23.58 KB 0644
rexec.pyo File 23.58 KB 0644
rfc822.py File 32.51 KB 0644
rfc822.pyc File 31.05 KB 0644
rfc822.pyo File 31.05 KB 0644
rlcompleter.py File 5.68 KB 0644
rlcompleter.pyc File 5.84 KB 0644
rlcompleter.pyo File 5.84 KB 0644
robotparser.py File 7.03 KB 0644
robotparser.pyc File 7.7 KB 0644
robotparser.pyo File 7.7 KB 0644
runpy.py File 10.45 KB 0644
runpy.pyc File 8.21 KB 0644
runpy.pyo File 8.21 KB 0644
sched.py File 4.97 KB 0644
sched.pyc File 4.88 KB 0644
sched.pyo File 4.88 KB 0644
sets.py File 18.6 KB 0644
sets.pyc File 16.5 KB 0644
sets.pyo File 16.5 KB 0644
sgmllib.py File 17.46 KB 0644
sgmllib.pyc File 15.07 KB 0644
sgmllib.pyo File 15.07 KB 0644
sha.py File 393 B 0644
sha.pyc File 421 B 0644
sha.pyo File 421 B 0644
shelve.py File 7.89 KB 0644
shelve.pyc File 10.03 KB 0644
shelve.pyo File 10.03 KB 0644
shlex.py File 10.88 KB 0644
shlex.pyc File 7.37 KB 0644
shlex.pyo File 7.37 KB 0644
shutil.py File 18.46 KB 0644
shutil.pyc File 18.1 KB 0644
shutil.pyo File 18.1 KB 0644
site.py File 19.61 KB 0644
site.pyc File 19.11 KB 0644
site.pyo File 19.11 KB 0644
smtpd.py File 18.11 KB 0755
smtpd.pyc File 15.52 KB 0644
smtpd.pyo File 15.52 KB 0644
smtplib.py File 30.9 KB 0755
smtplib.pyc File 29.29 KB 0644
smtplib.pyo File 29.29 KB 0644
sndhdr.py File 5.83 KB 0644
sndhdr.pyc File 7.18 KB 0644
sndhdr.pyo File 7.18 KB 0644
socket.py File 20.03 KB 0644
socket.pyc File 15.73 KB 0644
socket.pyo File 15.64 KB 0644
sre.py File 384 B 0644
sre.pyc File 519 B 0644
sre.pyo File 519 B 0644
sre_compile.py File 15.99 KB 0644
sre_compile.pyc File 10.76 KB 0644
sre_compile.pyo File 10.65 KB 0644
sre_constants.py File 6.95 KB 0644
sre_constants.pyc File 5.97 KB 0644
sre_constants.pyo File 5.97 KB 0644
sre_parse.py File 26.84 KB 0644
sre_parse.pyc File 18.98 KB 0644
sre_parse.pyo File 18.98 KB 0644
ssl.py File 38.7 KB 0644
ssl.pyc File 32.05 KB 0644
ssl.pyo File 32.05 KB 0644
stat.py File 1.8 KB 0644
stat.pyc File 2.69 KB 0644
stat.pyo File 2.69 KB 0644
statvfs.py File 898 B 0644
statvfs.pyc File 620 B 0644
statvfs.pyo File 620 B 0644
string.py File 20.27 KB 0644
string.pyc File 19.54 KB 0644
string.pyo File 19.54 KB 0644
stringold.py File 12.16 KB 0644
stringold.pyc File 12.25 KB 0644
stringold.pyo File 12.25 KB 0644
stringprep.py File 13.21 KB 0644
stringprep.pyc File 14.15 KB 0644
stringprep.pyo File 14.08 KB 0644
struct.py File 82 B 0644
struct.pyc File 239 B 0644
struct.pyo File 239 B 0644
subprocess.py File 57.68 KB 0644
subprocess.pyc File 40.93 KB 0644
subprocess.pyo File 40.93 KB 0644
sunau.py File 16.15 KB 0644
sunau.pyc File 17.53 KB 0644
sunau.pyo File 17.53 KB 0644
sunaudio.py File 1.37 KB 0644
sunaudio.pyc File 1.94 KB 0644
sunaudio.pyo File 1.94 KB 0644
symbol.py File 2.01 KB 0755
symbol.pyc File 2.96 KB 0644
symbol.pyo File 2.96 KB 0644
symtable.py File 7.34 KB 0644
symtable.pyc File 11.59 KB 0644
symtable.pyo File 11.46 KB 0644
sysconfig.py File 21.88 KB 0644
sysconfig.pyc File 17.23 KB 0644
sysconfig.pyo File 17.23 KB 0644
tabnanny.py File 11.07 KB 0755
tabnanny.pyc File 8.05 KB 0644
tabnanny.pyo File 8.05 KB 0644
tarfile.py File 88 KB 0644
tarfile.pyc File 73.78 KB 0644
tarfile.pyo File 73.78 KB 0644
telnetlib.py File 26.18 KB 0644
telnetlib.pyc File 22.53 KB 0644
telnetlib.pyo File 22.53 KB 0644
tempfile.py File 17.91 KB 0644
tempfile.pyc File 19.35 KB 0644
tempfile.pyo File 19.35 KB 0644
textwrap.py File 16.64 KB 0644
textwrap.pyc File 11.62 KB 0644
textwrap.pyo File 11.53 KB 0644
this.py File 1002 B 0644
this.pyc File 1.19 KB 0644
this.pyo File 1.19 KB 0644
threading.py File 46.28 KB 0644
threading.pyc File 41.7 KB 0644
threading.pyo File 39.58 KB 0644
timeit.py File 11.82 KB 0644
timeit.pyc File 11.5 KB 0644
timeit.pyo File 11.5 KB 0644
toaiff.py File 3.07 KB 0644
toaiff.pyc File 3.03 KB 0644
toaiff.pyo File 3.03 KB 0644
token.py File 2.88 KB 0755
token.pyc File 3.73 KB 0644
token.pyo File 3.73 KB 0644
tokenize.py File 16.15 KB 0644
tokenize.pyc File 13.61 KB 0644
tokenize.pyo File 13.52 KB 0644
trace.py File 29.19 KB 0644
trace.pyc File 22.26 KB 0644
trace.pyo File 22.2 KB 0644
traceback.py File 10.99 KB 0644
traceback.pyc File 11.35 KB 0644
traceback.pyo File 11.35 KB 0644
tty.py File 879 B 0644
tty.pyc File 1.29 KB 0644
tty.pyo File 1.29 KB 0644
types.py File 1.99 KB 0644
types.pyc File 2.45 KB 0644
types.pyo File 2.45 KB 0644
urllib.py File 57.14 KB 0644
urllib.pyc File 49.1 KB 0644
urllib.pyo File 49 KB 0644
urllib2.py File 51.87 KB 0644
urllib2.pyc File 46.61 KB 0644
urllib2.pyo File 46.52 KB 0644
urlparse.py File 16.44 KB 0644
urlparse.pyc File 15.38 KB 0644
urlparse.pyo File 15.38 KB 0644
user.py File 1.59 KB 0644
user.pyc File 1.68 KB 0644
user.pyo File 1.68 KB 0644
uu.py File 6.4 KB 0755
uu.pyc File 4.21 KB 0644
uu.pyo File 4.21 KB 0644
uuid.py File 20.6 KB 0644
uuid.pyc File 20.68 KB 0644
uuid.pyo File 20.68 KB 0644
warnings.py File 13.71 KB 0644
warnings.pyc File 12.84 KB 0644
warnings.pyo File 12.02 KB 0644
wave.py File 17.67 KB 0644
wave.pyc File 19 KB 0644
wave.pyo File 18.94 KB 0644
weakref.py File 10.44 KB 0644
weakref.pyc File 13.72 KB 0644
weakref.pyo File 13.72 KB 0644
webbrowser.py File 22.19 KB 0644
webbrowser.pyc File 19.32 KB 0644
webbrowser.pyo File 19.27 KB 0644
whichdb.py File 3.3 KB 0644
whichdb.pyc File 2.19 KB 0644
whichdb.pyo File 2.19 KB 0644
wsgiref.egg-info File 187 B 0644
xdrlib.py File 5.43 KB 0644
xdrlib.pyc File 9.07 KB 0644
xdrlib.pyo File 9.07 KB 0644
xmllib.py File 34.05 KB 0644
xmllib.pyc File 26.22 KB 0644
xmllib.pyo File 26.22 KB 0644
xmlrpclib.py File 50.78 KB 0644
xmlrpclib.pyc File 42.89 KB 0644
xmlrpclib.pyo File 42.71 KB 0644
zipfile.py File 56.45 KB 0644
zipfile.pyc File 40.33 KB 0644
zipfile.pyo File 40.33 KB 0644