@@ -203,9 +203,6 @@ def parse_arguments():
203203 help = 'Specify your password in clear-text on the '
204204 'command line. If not specified, will prompt and '
205205 'obfuscate as you type.' )
206- parser .add_argument ('--cookie' , type = str , action = 'store' ,
207- help = 'Instead of logging in with a password, '
208- 'provide the li_at cookie assigned after login ' )
209206 parser .add_argument ('-n' , '--domain' , type = str , action = 'store' ,
210207 default = '' ,
211208 help = 'Append a domain name to username output. '
@@ -256,8 +253,7 @@ def parse_arguments():
256253
257254 # If password is not passed in the command line, prompt for it
258255 # in a more secure fashion (not shown on screen)
259- if args .cookie is None :
260- args .password = args .password or getpass .getpass ()
256+ args .password = args .password or getpass .getpass ()
261257
262258 return args
263259
@@ -317,14 +313,6 @@ def login(args):
317313 'loginCsrfParam' : login_csrf
318314 }
319315
320- # If authentication via cookies is specified, set the important cookie
321- # and return the session
322- if args .cookie :
323-
324- session .cookies ['li_at' ] = args .cookie
325- return session
326-
327-
328316 # Perform the actual login. We disable redirects as we will use that 302
329317 # as an indicator of a successful logon.
330318 response = session .post ('https://www.linkedin.com/checkpoint/lg/login-submit'
0 commit comments