Linux curl表单登录或提交与cookie使用详解
前言
本文主要讲解通过curl 实现表单提交登录。单独的表单提交与表单登录都差不多,因此就不单独说了。
说明:针对curl表单提交实现登录,不是所有网站都适用,原因是有些网站后台做了限制或有其他校验。我们不知道这些网站后台的限制或校验机制具体是什么,因此直接curl表单登录可能是不行的。
当然,如下案例是可以用curl登录的。
案例:leancloud登录
要求和结果
要求:通过curl登录后,能正常访问leancloud的应用页面。
登录页面链接如下:
1 https://leancloud.cn/dashboard/login.html#/signin
能正常访问如下页面:
1 https://leancloud.cn/dashboard/applist.html#/apps
浏览器访问效果:
无登录直接访问结果浏览器访问结果
上图红框 403 中的访问连接如下:
1 https://leancloud.cn/1.1/clients/self/apps
通过curl 验证是否登录
[root@iz28xbsfvc4z ~]# curl -i https://leancloud.cn/1.1/clients/self/apps http/1.1 403 forbidden server: openresty date: sun, 14 jul 2019 11:35:28 gmt content-type: application/json;charset=utf-8 transfer-encoding: chunked connection: keep-alive vary: accept-encoding cache-control: no-cache,no-store pragma: no-cache {"code":1,"error":"user doesn't sign in."}
获取表单字段信息
获取表单提交链接
通过下图可得到表单提交的链接信息。具体如下:
1 https://leancloud.cn/1.1/signin
curl 表单登录并保存cookie信息
1 curl -v -c leancloud1.info -x post -f 'email=yourname' -f 'password=yourpassword' https://leancloud.cn/1.1/signin 2 # 或则 3 curl -v -c leancloud3.info -x post -d 'email=yourname&password=yourpassword' https://leancloud.cn/1.1/signin
查看cookie信息
[root@iz28xbsfvc4z 20190714_02]# ll total 32 -rw-r--r-- 1 root root 337 jul 14 19:45 leancloud1.info -rw-r--r-- 1 root root 335 jul 14 19:46 leancloud3.info [root@iz28xbsfvc4z 20190714_02]# cat leancloud1.info # netscape http cookie file # http://curl.haxx.se/docs/http-cookies.html # this file was generated by libcurl! edit at your own risk. #httponly_leancloud.cn false / true 1563709522 uluru_user ff1ipoimx%2f6ipevuxy0oog%3d%3d leancloud.cn false / true 1563709522 xsrf-token 5647dc84bd6eaea37eca2d07ae0e401cca4ba76803989c8559xxxxx7283da [root@iz28xbsfvc4z 20190714_02]# cat leancloud3.info # netscape http cookie file # http://curl.haxx.se/docs/http-cookies.html # this file was generated by libcurl! edit at your own risk. #httponly_leancloud.cn false / true 1563709591 uluru_user artwqm6jylzljbaqt7tpiq%3d%3d leancloud.cn false / true 1563709591 xsrf-token 751e12827c7c046408541bc1bf962b5912ac35b0d07f88120xxxxxx40704704
每列字段说明:
domain:创建并可以读取变量的域名。
flag:一个 true/false 值,表明给定域中的所有机器是否都可以访问该变量。此值由浏览器自动设置,具体取决于你为域设置的值。
path:变量在域中有效的路径。
secure:一个 true/false 值,表明是否需要与域的安全连接来访问变量。
expiration:该变量将过期的unix时间。unix时间定义为自1970年1月1日00:00:00 gmt开始的秒数。
name:变量名称
value:变量值
校验是否登录成功
直接访问和带有cookie访问,这两种访问方式,请对比查看。
直接访问
[root@iz28xbsfvc4z 20190714_02]# curl -i https://leancloud.cn/1.1/clients/self/apps http/1.1 403 forbidden server: openresty date: sun, 14 jul 2019 11:52:47 gmt content-type: application/json;charset=utf-8 transfer-encoding: chunked connection: keep-alive vary: accept-encoding cache-control: no-cache,no-store pragma: no-cache {"code":1,"error":"user doesn't sign in."}
带有cookie文件的访问
# 使用cookie [root@iz28xbsfvc4z 20190714_02]# curl -i -b leancloud1.info https://leancloud.cn/1.1/clients/self/apps ## 或者 [root@iz28xbsfvc4z 20190714_02]# curl -i -b leancloud3.info https://leancloud.cn/1.1/clients/self/apps http/1.1 200 ok server: openresty date: sun, 14 jul 2019 11:53:29 gmt content-type: application/json;charset=utf-8 transfer-encoding: chunked connection: keep-alive vary: accept-encoding cache-control: no-cache,no-store pragma: no-cache strict-transport-security: max-age=31536000 [{"app_domain":null,"description":null,"archive_status":0,"biz_type":"dev","master_key": ………………
复制浏览器的cookie访问
[root@iz28xbsfvc4z 20190720]# curl -i -h 'cookie: _ga=ga1.2.2055706705.1560005524; …………' https://leancloud.cn/1.1/clients/self/apps http/1.1 200 ok server: openresty date: sat, 20 jul 2019 08:11:37 gmt content-type: application/json;charset=utf-8 transfer-encoding: chunked connection: keep-alive vary: accept-encoding cache-control: no-cache,no-store pragma: no-cache strict-transport-security: max-age=31536000 [{"app_domain":null,"description":null,"archive_status":0,"biz_type":"dev","master_key": ………………
由上可知curl登录成功。
总结
以上就是这篇文章的全部内容了,希望本文的内容对大家的学习或者工作具有一定的参考学习价值,谢谢大家对的支持。