2013-01-18 01:50:31 +00:00
|
|
|
import socket, time
|
2013-02-23 22:34:01 +00:00
|
|
|
import mock
|
2012-07-15 20:42:45 +00:00
|
|
|
from netlib import tcp
|
2013-01-06 03:44:12 +00:00
|
|
|
from libpathod import pathoc
|
2013-02-16 03:46:16 +00:00
|
|
|
import tutils, tservers
|
2013-02-23 08:59:25 +00:00
|
|
|
from libmproxy import flow, proxy
|
2011-03-05 22:21:31 +00:00
|
|
|
|
2012-06-10 01:17:18 +00:00
|
|
|
"""
|
|
|
|
Note that the choice of response code in these tests matters more than you
|
|
|
|
might think. libcurl treats a 304 response code differently from, say, a
|
|
|
|
200 response code - it will correctly terminate a 304 response with no
|
|
|
|
content-length header, whereas it will block forever waiting for content
|
|
|
|
for a 200 response.
|
|
|
|
"""
|
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
class CommonMixin:
|
2012-06-13 06:16:47 +00:00
|
|
|
def test_large(self):
|
2012-06-14 21:20:10 +00:00
|
|
|
assert len(self.pathod("200:b@50k").content) == 1024*50
|
2012-06-13 06:16:47 +00:00
|
|
|
|
2012-07-08 23:03:55 +00:00
|
|
|
def test_replay(self):
|
|
|
|
assert self.pathod("304").status_code == 304
|
|
|
|
assert len(self.master.state.view) == 1
|
|
|
|
l = self.master.state.view[0]
|
|
|
|
assert l.response.code == 304
|
|
|
|
l.request.path = "/p/305"
|
2012-07-10 11:29:33 +00:00
|
|
|
rt = self.master.replay_request(l, block=True)
|
2012-07-08 23:03:55 +00:00
|
|
|
assert l.response.code == 305
|
|
|
|
|
2012-07-08 23:18:03 +00:00
|
|
|
# Disconnect error
|
|
|
|
l.request.path = "/p/305:d0"
|
2012-07-10 11:29:33 +00:00
|
|
|
rt = self.master.replay_request(l, block=True)
|
2012-07-08 23:18:03 +00:00
|
|
|
assert l.error
|
|
|
|
|
|
|
|
# Port error
|
|
|
|
l.request.port = 1
|
2012-07-15 20:42:59 +00:00
|
|
|
self.master.replay_request(l, block=True)
|
2012-07-08 23:18:03 +00:00
|
|
|
assert l.error
|
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
def test_http(self):
|
|
|
|
f = self.pathod("304")
|
|
|
|
assert f.status_code == 304
|
2011-03-05 22:21:31 +00:00
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
l = self.master.state.view[0]
|
|
|
|
assert l.request.client_conn.address
|
|
|
|
assert "host" in l.request.headers
|
|
|
|
assert l.response.code == 304
|
2013-02-16 03:46:16 +00:00
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestHTTP(tservers.HTTPProxTest, CommonMixin):
|
2013-02-16 03:46:16 +00:00
|
|
|
def test_app_err(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
ret = p.request("get:'http://errapp/'")
|
2013-02-28 20:05:39 +00:00
|
|
|
assert ret.status_code == 500
|
|
|
|
assert "ValueError" in ret.content
|
2013-02-16 03:46:16 +00:00
|
|
|
|
2012-06-30 03:59:42 +00:00
|
|
|
def test_invalid_http(self):
|
|
|
|
t = tcp.TCPClient("127.0.0.1", self.proxy.port)
|
|
|
|
t.connect()
|
|
|
|
t.wfile.write("invalid\n\n")
|
|
|
|
t.wfile.flush()
|
|
|
|
assert "Bad Request" in t.rfile.readline()
|
|
|
|
|
|
|
|
def test_invalid_connect(self):
|
|
|
|
t = tcp.TCPClient("127.0.0.1", self.proxy.port)
|
|
|
|
t.connect()
|
|
|
|
t.wfile.write("CONNECT invalid\n\n")
|
|
|
|
t.wfile.flush()
|
|
|
|
assert "Bad Request" in t.rfile.readline()
|
2012-06-09 00:13:01 +00:00
|
|
|
|
2013-01-06 03:44:12 +00:00
|
|
|
def test_upstream_ssl_error(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
ret = p.request("get:'https://localhost:%s/'"%self.server.port)
|
2013-02-28 20:05:39 +00:00
|
|
|
assert ret.status_code == 400
|
2013-01-06 03:44:12 +00:00
|
|
|
|
2013-02-23 21:51:14 +00:00
|
|
|
def test_connection_close(self):
|
|
|
|
# Add a body, so we have a content-length header, which combined with
|
|
|
|
# HTTP1.1 means the connection is kept alive.
|
2013-02-24 09:24:21 +00:00
|
|
|
response = '%s/p/200:b@1'%self.server.urlbase
|
2013-02-23 21:51:14 +00:00
|
|
|
|
|
|
|
# Lets sanity check that the connection does indeed stay open by
|
|
|
|
# issuing two requests over the same connection
|
|
|
|
p = self.pathoc()
|
|
|
|
assert p.request("get:'%s'"%response)
|
|
|
|
assert p.request("get:'%s'"%response)
|
|
|
|
|
|
|
|
# Now check that the connection is closed as the client specifies
|
|
|
|
p = self.pathoc()
|
|
|
|
assert p.request("get:'%s':h'Connection'='close'"%response)
|
|
|
|
tutils.raises("disconnect", p.request, "get:'%s'"%response)
|
|
|
|
|
2013-02-24 01:04:56 +00:00
|
|
|
def test_reconnect(self):
|
2013-02-24 09:24:21 +00:00
|
|
|
req = "get:'%s/p/200:b@1:da'"%self.server.urlbase
|
2013-02-24 01:04:56 +00:00
|
|
|
p = self.pathoc()
|
|
|
|
assert p.request(req)
|
|
|
|
# Server has disconnected. Mitmproxy should detect this, and reconnect.
|
|
|
|
assert p.request(req)
|
|
|
|
assert p.request(req)
|
|
|
|
|
|
|
|
# However, if the server disconnects on our first try, it's an error.
|
2013-02-24 09:24:21 +00:00
|
|
|
req = "get:'%s/p/200:b@1:d0'"%self.server.urlbase
|
2013-02-24 01:04:56 +00:00
|
|
|
p = self.pathoc()
|
|
|
|
tutils.raises("server disconnect", p.request, req)
|
|
|
|
|
2013-02-23 22:34:01 +00:00
|
|
|
def test_proxy_ioerror(self):
|
|
|
|
# Tests a difficult-to-trigger condition, where an IOError is raised
|
|
|
|
# within our read loop.
|
|
|
|
with mock.patch("libmproxy.proxy.ProxyHandler.read_request") as m:
|
|
|
|
m.side_effect = IOError("error!")
|
2013-02-28 20:05:39 +00:00
|
|
|
tutils.raises("server disconnect", self.pathod, "304")
|
2013-02-23 22:34:01 +00:00
|
|
|
|
2013-02-24 09:24:21 +00:00
|
|
|
def test_get_connection_switching(self):
|
|
|
|
def switched(l):
|
|
|
|
for i in l:
|
|
|
|
if "switching" in i:
|
|
|
|
return True
|
|
|
|
req = "get:'%s/p/200:b@1'"
|
|
|
|
p = self.pathoc()
|
|
|
|
assert p.request(req%self.server.urlbase)
|
|
|
|
assert p.request(req%self.server2.urlbase)
|
|
|
|
assert switched(self.proxy.log)
|
|
|
|
|
|
|
|
def test_get_connection_err(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
ret = p.request("get:'http://localhost:0'")
|
2013-02-28 20:05:39 +00:00
|
|
|
assert ret.status_code == 502
|
2013-02-24 09:24:21 +00:00
|
|
|
|
2013-02-23 22:34:01 +00:00
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
class TestHTTPS(tservers.HTTPProxTest, CommonMixin):
|
2012-06-09 00:13:01 +00:00
|
|
|
ssl = True
|
2013-01-18 04:08:30 +00:00
|
|
|
clientcerts = True
|
2013-01-20 09:39:28 +00:00
|
|
|
def test_clientcert(self):
|
|
|
|
f = self.pathod("304")
|
2013-03-02 01:52:05 +00:00
|
|
|
assert f.status_code == 304
|
2013-02-24 09:24:21 +00:00
|
|
|
assert self.server.last_log()["request"]["clientcert"]["keyinfo"]
|
2012-06-09 00:13:01 +00:00
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
def test_sni(self):
|
2013-03-02 01:52:05 +00:00
|
|
|
f = self.pathod("304", sni="testserver.com")
|
|
|
|
assert f.status_code == 304
|
|
|
|
l = self.server.last_log()
|
|
|
|
assert self.server.last_log()["request"]["sni"] == "testserver.com"
|
2013-02-28 20:05:39 +00:00
|
|
|
|
2012-06-09 00:13:01 +00:00
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
class TestHTTPSCertfile(tservers.HTTPProxTest, CommonMixin):
|
2013-02-24 09:52:59 +00:00
|
|
|
ssl = True
|
|
|
|
certfile = True
|
|
|
|
def test_certfile(self):
|
|
|
|
assert self.pathod("304")
|
|
|
|
|
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
class TestReverse(tservers.ReverseProxTest, CommonMixin):
|
2012-06-09 08:41:28 +00:00
|
|
|
reverse = True
|
|
|
|
|
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
class TestTransparent(tservers.TransparentProxTest, CommonMixin):
|
|
|
|
transparent = True
|
|
|
|
ssl = False
|
|
|
|
|
|
|
|
|
|
|
|
class TestTransparentSSL(tservers.TransparentProxTest, CommonMixin):
|
2012-06-14 21:20:10 +00:00
|
|
|
transparent = True
|
2013-02-28 20:05:39 +00:00
|
|
|
ssl = True
|
2013-03-02 02:06:49 +00:00
|
|
|
def test_sni(self):
|
|
|
|
f = self.pathod("304", sni="testserver.com")
|
|
|
|
assert f.status_code == 304
|
|
|
|
l = self.server.last_log()
|
|
|
|
assert self.server.last_log()["request"]["sni"] == "testserver.com"
|
|
|
|
|
2012-06-14 21:20:10 +00:00
|
|
|
|
|
|
|
|
2013-02-16 03:46:16 +00:00
|
|
|
class TestProxy(tservers.HTTPProxTest):
|
2011-03-05 22:21:31 +00:00
|
|
|
def test_http(self):
|
2012-06-10 01:17:18 +00:00
|
|
|
f = self.pathod("304")
|
|
|
|
assert f.status_code == 304
|
2012-01-20 23:43:00 +00:00
|
|
|
|
2012-07-08 22:58:28 +00:00
|
|
|
l = self.master.state.view[0]
|
|
|
|
assert l.request.client_conn.address
|
|
|
|
assert "host" in l.request.headers
|
|
|
|
assert l.response.code == 304
|
2013-01-17 15:32:56 +00:00
|
|
|
|
|
|
|
def test_response_timestamps(self):
|
|
|
|
# test that we notice at least 2 sec delay between timestamps
|
|
|
|
# in response object
|
2013-01-28 21:41:45 +00:00
|
|
|
f = self.pathod("304:b@1k:p50,1")
|
2013-01-17 15:32:56 +00:00
|
|
|
assert f.status_code == 304
|
|
|
|
|
|
|
|
response = self.master.state.view[0].response
|
2013-01-28 21:41:45 +00:00
|
|
|
assert 1 <= response.timestamp_end - response.timestamp_start <= 1.2
|
2013-01-17 15:32:56 +00:00
|
|
|
|
|
|
|
def test_request_timestamps(self):
|
2013-01-28 21:41:45 +00:00
|
|
|
# test that we notice a delay between timestamps in request object
|
2013-01-17 15:32:56 +00:00
|
|
|
connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
connection.connect(("127.0.0.1", self.proxy.port))
|
|
|
|
|
|
|
|
# call pathod server, wait a second to complete the request
|
|
|
|
connection.send("GET http://localhost:%d/p/304:b@1k HTTP/1.1\r\n"%self.server.port)
|
|
|
|
connection.send("\r\n");
|
|
|
|
connection.recv(50000)
|
|
|
|
connection.close()
|
|
|
|
|
|
|
|
request, response = self.master.state.view[0].request, self.master.state.view[0].response
|
|
|
|
assert response.code == 304 # sanity test for our low level request
|
2013-01-28 21:41:45 +00:00
|
|
|
assert request.timestamp_end - request.timestamp_start > 0
|
2013-01-17 15:32:56 +00:00
|
|
|
|
|
|
|
def test_request_timestamps_not_affected_by_client_time(self):
|
|
|
|
# test that don't include user wait time in request's timestamps
|
|
|
|
|
|
|
|
f = self.pathod("304:b@10k")
|
|
|
|
assert f.status_code == 304
|
|
|
|
f = self.pathod("304:b@10k")
|
|
|
|
assert f.status_code == 304
|
|
|
|
|
|
|
|
request = self.master.state.view[0].request
|
|
|
|
assert request.timestamp_end - request.timestamp_start <= 0.1
|
|
|
|
|
|
|
|
request = self.master.state.view[1].request
|
|
|
|
assert request.timestamp_end - request.timestamp_start <= 0.1
|
2013-02-23 03:34:59 +00:00
|
|
|
|
|
|
|
|
2013-02-23 08:59:25 +00:00
|
|
|
|
2013-02-23 03:34:59 +00:00
|
|
|
class MasterFakeResponse(tservers.TestMaster):
|
|
|
|
def handle_request(self, m):
|
|
|
|
resp = tutils.tresp()
|
|
|
|
m.reply(resp)
|
|
|
|
|
|
|
|
|
|
|
|
class TestFakeResponse(tservers.HTTPProxTest):
|
|
|
|
masterclass = MasterFakeResponse
|
|
|
|
def test_kill(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
f = self.pathod("200")
|
|
|
|
assert "header_response" in f.headers.keys()
|
|
|
|
|
2013-02-23 08:59:25 +00:00
|
|
|
|
|
|
|
|
|
|
|
class MasterKillRequest(tservers.TestMaster):
|
|
|
|
def handle_request(self, m):
|
|
|
|
m.reply(proxy.KILL)
|
|
|
|
|
|
|
|
|
|
|
|
class TestKillRequest(tservers.HTTPProxTest):
|
|
|
|
masterclass = MasterKillRequest
|
|
|
|
def test_kill(self):
|
|
|
|
p = self.pathoc()
|
2013-02-28 20:05:39 +00:00
|
|
|
tutils.raises("server disconnect", self.pathod, "200")
|
2013-02-23 08:59:25 +00:00
|
|
|
# Nothing should have hit the server
|
2013-02-24 09:24:21 +00:00
|
|
|
assert not self.server.last_log()
|
2013-02-23 08:59:25 +00:00
|
|
|
|
|
|
|
|
|
|
|
class MasterKillResponse(tservers.TestMaster):
|
|
|
|
def handle_response(self, m):
|
|
|
|
m.reply(proxy.KILL)
|
|
|
|
|
|
|
|
|
|
|
|
class TestKillResponse(tservers.HTTPProxTest):
|
|
|
|
masterclass = MasterKillResponse
|
|
|
|
def test_kill(self):
|
|
|
|
p = self.pathoc()
|
2013-02-28 20:05:39 +00:00
|
|
|
tutils.raises("server disconnect", self.pathod, "200")
|
2013-02-23 08:59:25 +00:00
|
|
|
# The server should have seen a request
|
2013-02-24 09:24:21 +00:00
|
|
|
assert self.server.last_log()
|
2013-02-23 08:59:25 +00:00
|
|
|
|