Every line of 'running curl command in python' code snippets is scanned for vulnerabilities by our powerful machine learning engine that combs millions of open source libraries, ensuring your Python code is secure.
21 def ccurl(url): 22 hdr = "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:37.0) Gecko/20100101 Firefox/37.0" 23 24 content = subprocess.check_output(['curl','-L','-A',hdr,url]) 25 if isinstance(content,bytes): 26 print("I'm byte") 27 try: 28 content = str((content).decode('utf-8')) 29 except: 30 content = str(content) 31 else: 32 print(type(content)) 33 content = str(content) 34 print("I'm unicode") 35 36 return (content)
14 def curl_command(f: flow.Flow) -> str: 15 if not hasattr(f, "request"): 16 raise exceptions.CommandError("Can't export flow with no request.") 17 data = "curl " 18 request = f.request.copy() # type: ignore 19 request.decode(strict=False) 20 for k, v in request.headers.items(multi=True): 21 data += "-H '%s:%s' " % (k, v) 22 if request.method != "GET": 23 data += "-X %s " % request.method 24 data += "'%s'" % request.url 25 if request.content: 26 data += " --data-binary '%s'" % strutils.bytes_to_escaped_str( 27 request.content, 28 escape_single_quotes=True 29 ) 30 return data