Skip to main content

Equivalent shlex module for the Win32 world

Project description

w32lex

This package contains a pure Python 3 implementation of split, join and quote functions similar to those found in the builtin shlex.py module, but suitable for the Windows world.

It was tested against optimum mslex project (v.1.2.0) and it gives mostly the same results (but with no regexes used), with a difference: CommandLineToArgvW (and parse_cmdline from VC run-time) parser and CMD parser/tokenizer are implemented in distintct functions.

At a glance, a compatible modern Win32 parser follows such rules when splitting a command line:

  • leading and trailing spaces are stripped from command line
  • unquoted whitespace separates arguments
  • quotes:
    • " opens a block
    • "" opens and closes a block;
    • """ opens, adds a literal " and closes a block
  • backslashes, only if followed by ":
    • 2n -> n, and opens/closes a block
    • (2n+1) -> n, and adds a literal "
  • all other characters are simply copied.

split accepts an optional argument mode to set the compatibility level:

  • with mode=SPLIT_SHELL32 (default), it behaves like standard Windows parser (SHELL32);
  • with mode=SPLIT_ARGV0, first argument is parsed in a simplified way (i.e. argument is everything up to the first space if unquoted, or the second quote otherwise);
  • with mode=SPLIT_VC2005, it emulates parse_cmdline from 2005 onwards (a "" inside a quoted block emit a literal quote without ending such block).

To parse the line like CMD does, separate functions cmd_split and cmd_parse are provided, with a corresponding cmd_quote.

cmd_split and cmd_parse accept a mode argument where further values can be specified:

  • CMD_VAREXPAND to make the parser expand environment %variables% in place;
  • CMD_EXCLMARK to expand also delayed expansion !variables!.

Some annotations about a Windows Command Prompt (CMD) parser follow.

CMD itself parses the command line before invoking commands, in an indipendent way from parse_cmdline (used internally by C apps built by Visual C++ compilers) or CommandLineToArgvW.

With the help of a simple C Windows app, we can look at the command line that CMD passes to an external command:

#include <windows.h>
#pragma comment(linker,"/DEFAULTLIB:USER32.lib")
int WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpCmdLine, int nCmdShow)
{
    return MessageBox(0, lpCmdLine, "lpCmdLine=", MB_OK);
}

or, from the CMD line itself:

#include <windows.h>
#pragma comment(linker,"/DEFAULTLIB:USER32.lib")
void main() {
   puts(GetCommandLine());
}

The results we see, show that the parsing work CMD carries on is not trivial, not always clear and not constant in time. Some points:

  • : at line start (the label indicator in batch files) makes the parser ignore the rest (Windows 2000+) or signal an error;
  • one or more ;,=@, TAB, vertical TAB, form-feed and 0xFF characters at line start are ignored but
  • a starting @ is a special character in BAT scripts (=line echo off);
  • carriage-return character is ignored;
  • |&<>, and their doubled counterparts (except << which is invalid), are forbidden at line start;
  • empty () is forbidden;
  • (command) with one ore more balanced parenthesis is a valid form;
  • ^ escapes the character following; alone at line start, it should be forbidden (it asks for a second character to escape).
  • " starts a quoted block, escaping all special characters inside it except % , until another quote, or LF/EOS, is found. Quote belongs to the block and only the starting quote can be escaped by ^;
  • after a REM command, all special symbols are ignored;
  • pipe |, redirection <, >, >>, concatenation & and boolean operators &&, || split a line in subparts, since one or more commands have to be issued; white space is not needed around them;
  • many handle redirections are also permitted, with 0=STDIN, 1=STDOUT, 2=STDERR and a & premitted after the redirection operator (i.e. 2>&1 to redirect STDERR to STDOUT, or 2>err.log to copy STDERR to a file);
  • longer or different sequences of pipe, redirection, concatenation or boolean operators are forbidden;
  • %var% or ^%var% are replaced with the corresponding environment variable, if set (while ^%var^% and %var^% are both considered fully escaped);
  • all the other characters are simply copied and passed to the external commands. If the internal ones are targeted, further/different processing could occur; the same if special CMD environment variables are set. For example, SET A =B sets a variable named A (included the 3 blanks); FOR assigns special meaning to single quotes inside parenthesis; REM ignores subsequent tokens.

Some curious samples:

  • &a [b (c ;d !e %f ^g ,h =i are valid file system names
  • ^ a calls " a" (Windows 2000+) or ignores the line
  • ^;;a calls ";" passing argument ";a" (Windows 2000+; the same with ,= characters) or ignores the line
  • given a ;d file (the same with ,h and =i):
    • dir;d -> not found
    • dir ;d -> not found
    • dir ^;d -> not found
    • dir ";d" -> OK
    • dir "?d" -> OK
  • dir ^>b -> lists [b file above (!?), but using our simple Windows app we find that >b was passed literally, as expected;
  • dir 1>^&2 is as valid as dir 1>&2.

Things get even more complex if we take in account old DOS COMMAND.COM:

  • a starting @ outside BAT files is forbidden;
  • ^ is not recognized;
  • only a single ;,= at line start is ignored;
  • : at line start is ignored (Windows 95+) or is bad;
  • &, &&, || operators and parentheses () are not recognized;
  • numeric handles redirection and delayed expansion is unsupported, also.

A sample assembly program to play with old DOS command line:

; compile with NASM PRL.ASM -o PRL.COM
org 100h
bits 16

; DS:0000   PSP seg preloaded by DOS
; DS:0080   command-line length (following)
cmp byte [80h], 0
jnz GO
int 20h ; terminate COM
GO:
mov di, 80h
PRINT:
inc di
mov dl, [ds:di]
cmp dl, 0Dh
jz END
mov ah, 2 ; write char in DL to STDOUT
int 21h
jmp PRINT
END:
int 20h

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

w32lex-1.0.7.tar.gz (19.9 kB view details)

Uploaded Source

Built Distribution

w32lex-1.0.7-py3-none-any.whl (15.4 kB view details)

Uploaded Python 3

File details

Details for the file w32lex-1.0.7.tar.gz.

File metadata

  • Download URL: w32lex-1.0.7.tar.gz
  • Upload date:
  • Size: 19.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.1.1 CPython/3.12.7

File hashes

Hashes for w32lex-1.0.7.tar.gz
Algorithm Hash digest
SHA256 42f921989730f5d0210831ef9b85c44ba4deea8ef18d64f64f7133d6565822fe
MD5 78a341d1a16e7d1f6b39e0db7ec3a957
BLAKE2b-256 4c1a3b70e67819b95b9cb039b8a940dce8d5463c25f486fb6dc68a07ba82cabb

See more details on using hashes here.

File details

Details for the file w32lex-1.0.7-py3-none-any.whl.

File metadata

  • Download URL: w32lex-1.0.7-py3-none-any.whl
  • Upload date:
  • Size: 15.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.1.1 CPython/3.12.7

File hashes

Hashes for w32lex-1.0.7-py3-none-any.whl
Algorithm Hash digest
SHA256 07284958ccaf221956f661c4ddb47a35263d38bf8b022f58876e21cad50394ee
MD5 bc09c3aaba0c05bc977a135181e62fc3
BLAKE2b-256 27e60441905c73879f6f97ce1b0f85f0a7f400909d8f1bbbb096cb393939ac38

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page