Skip to main content

Equivalent shlex module for the Win32 world

Project description

w32lex

This package contains a pure Python 3 implementation of split, join and quote functions similar to those found in the builtin shlex.py module, but suitable for the Windows world.

It was tested against optimum mslex project (v.1.2.0) and it gives mostly the same results (but with no regexes used), with a difference: CommandLineToArgvW (and parse_cmdline from VC run-time) parser and CMD parser/tokenizer are implemented in distintct functions.

At a glance, a compatible modern Win32 parser follows such rules when splitting a command line:

  • leading and trailing spaces are stripped from command line
  • unquoted whitespace separates arguments
  • quotes:
    • " opens a block
    • "" opens and closes a block;
    • """ opens, adds a literal " and closes a block
  • backslashes, only if followed by ":
    • 2n -> n, and opens/closes a block
    • (2n+1) -> n, and adds a literal "
  • all other characters are simply copied.

split accepts an optional argument mode to set the compatibility level:

  • with mode=SPLIT_SHELL32 (default), it behaves like standard Windows parser (SHELL32);
  • with mode=SPLIT_ARGV0, first argument is parsed in a simplified way (i.e. argument is everything up to the first space if unquoted, or the second quote otherwise);
  • with mode=SPLIT_VC2005, it emulates parse_cmdline from 2005 onwards (a "" inside a quoted block emit a literal quote without ending such block).

To parse the line like CMD does, separate functions cmd_split and cmd_parse are provided, with a corresponding cmd_quote.

cmd_split and cmd_parse accept a mode argument where further values can be specified:

  • CMD_VAREXPAND to make the parser expand environment %variables% in place;
  • CMD_EXCLMARK to expand also delayed expansion !variables!.

Some annotations about a Windows Command Prompt (CMD) parser follow.

CMD itself parses the command line before invoking commands, in an indipendent way from parse_cmdline (used internally by C apps built by Visual C++ compilers) or CommandLineToArgvW.

With the help of a simple C Windows app, we can look at the command line that CMD passes to an external command:

#include <windows.h>
#pragma comment(linker,"/DEFAULTLIB:USER32.lib")
int WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpCmdLine, int nCmdShow)
{
    return MessageBox(0, lpCmdLine, "lpCmdLine=", MB_OK);
}

or, from the CMD line itself:

#include <windows.h>
#pragma comment(linker,"/DEFAULTLIB:USER32.lib")
void main() {
   puts(GetCommandLine());
}

The results we see, show that the parsing work CMD carries on is not trivial, not always clear and not constant in time. Some points:

  • : at line start (the label indicator in batch files) makes the parser ignore the rest (Windows 2000+) or signal an error;
  • one or more ;,=@, TAB, vertical TAB, form-feed and 0xFF characters at line start are ignored but
  • a starting @ is a special character in BAT scripts (=line echo off);
  • a/b at line start (without white space) is parsed as a /b (invoke "a" command with "/b" option), even if an ".\a\b" command exists - to invoke the latter, just quote it: "a/b";
  • carriage-return character is ignored;
  • |&<>, and their doubled counterparts (except << which is invalid), are forbidden at line start;
  • empty () is forbidden;
  • (command) with one ore more balanced parenthesis is a valid form;
  • ^ escapes the character following; alone at line start, it should be forbidden (it asks for a second character to escape).
  • " starts a quoted block, escaping all special characters inside it except % , until another quote, or LF/EOS, is found. Quote belongs to the block and only the starting quote can be escaped by ^;
  • after a REM command, all special symbols are ignored;
  • pipe |, redirection <, >, >>, concatenation & and boolean operators &&, || split a line in subparts, since one or more commands have to be issued; white space is not needed around them;
  • many handle redirections are also permitted, with 0=STDIN, 1=STDOUT, 2=STDERR and a & premitted after the redirection operator (i.e. 2>&1 to redirect STDERR to STDOUT, or 2>err.log to copy STDERR to a file);
  • longer or different sequences of pipe, redirection, concatenation or boolean operators are forbidden;
  • %var% or ^%var% are replaced with the corresponding environment variable, if set (while ^%var^% and %var^% are both considered fully escaped);
  • all the other characters are simply copied and passed to the external commands. If the internal ones are targeted, further/different processing could occur; the same if special CMD environment variables are set. For example, SET A =B sets a variable named A (included the 3 blanks); FOR assigns special meaning to single quotes inside parenthesis; REM ignores subsequent tokens.

Some curious samples:

  • &a [b (c ;d !e %f ^g ,h =i are valid file system names
  • ^ a calls " a" (Windows 2000+) or ignores the line
  • ^;;a calls ";" passing argument ";a" (Windows 2000+; the same with ,= characters) or ignores the line
  • given a ;d file (the same with ,h and =i):
    • dir;d -> not found
    • dir ;d -> not found
    • dir ^;d -> not found
    • dir ";d" -> OK
    • dir "?d" -> OK
  • dir ^>b -> lists [b file above (!?), but using our simple Windows app we find that >b was passed literally, as expected;
  • dir 1>^&2 is as valid as dir 1>&2.

Things get even more complex if we take in account old DOS COMMAND.COM:

  • a starting @ outside BAT files is forbidden;
  • ^ is not recognized;
  • only a single ;,= at line start is ignored;
  • : at line start is ignored (Windows 95+) or is bad;
  • &, &&, || operators and parentheses () are not recognized;
  • numeric handles redirection and delayed expansion is unsupported, also.

A sample assembly program to play with old DOS command line:

; compile with NASM PRL.ASM -o PRL.COM
org 100h
bits 16

; DS:0000   PSP seg preloaded by DOS
; DS:0080   command-line length (following)
cmp byte [80h], 0
jnz GO
int 20h ; terminate COM
GO:
mov di, 80h
PRINT:
inc di
mov dl, [ds:di]
cmp dl, 0Dh
jz END
mov ah, 2 ; write char in DL to STDOUT
int 21h
jmp PRINT
END:
int 20h

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

w32lex-1.0.8.tar.gz (20.3 kB view details)

Uploaded Source

Built Distribution

w32lex-1.0.8-py3-none-any.whl (15.6 kB view details)

Uploaded Python 3

File details

Details for the file w32lex-1.0.8.tar.gz.

File metadata

  • Download URL: w32lex-1.0.8.tar.gz
  • Upload date:
  • Size: 20.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.1.1 CPython/3.12.7

File hashes

Hashes for w32lex-1.0.8.tar.gz
Algorithm Hash digest
SHA256 3257ab2b3cf98b68bec33edb02556ef831969d6959960a17a90e0f3ffb92f36c
MD5 4504228842ce9aadb05fbabc896436e0
BLAKE2b-256 5768c93def5a869960a64d7b8217da029c31ff0ad003bd85f92e0cc3f05504ac

See more details on using hashes here.

File details

Details for the file w32lex-1.0.8-py3-none-any.whl.

File metadata

  • Download URL: w32lex-1.0.8-py3-none-any.whl
  • Upload date:
  • Size: 15.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.1.1 CPython/3.12.7

File hashes

Hashes for w32lex-1.0.8-py3-none-any.whl
Algorithm Hash digest
SHA256 9a95804801605fae1fa5a76acfc0c08811833920544fc40d2ca62eae1738cbaf
MD5 818de1a3535b0cb47335cd4bc0dd2279
BLAKE2b-256 056e36f4afe819f081a4bf60b30aac463b189b7191fe652e2f14e3d16bd839af

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page