2014-09-06 23:38:44 +00:00
|
|
|
import json
|
2016-03-20 18:40:03 +00:00
|
|
|
from six.moves import cStringIO as StringIO
|
2014-10-25 02:30:54 +00:00
|
|
|
import re
|
2016-02-15 18:43:55 +00:00
|
|
|
import pytest
|
2015-06-08 13:28:24 +00:00
|
|
|
from mock import Mock
|
2014-10-25 02:30:54 +00:00
|
|
|
|
2016-05-28 12:36:43 +00:00
|
|
|
from netlib import http
|
|
|
|
from netlib import tcp
|
|
|
|
from netlib.exceptions import NetlibException
|
2015-07-18 13:54:29 +00:00
|
|
|
from netlib.http import http1, http2
|
2015-07-15 20:04:25 +00:00
|
|
|
|
2016-02-16 19:59:33 +00:00
|
|
|
from pathod import pathoc, test, version, pathod, language
|
2015-09-16 16:44:34 +00:00
|
|
|
from netlib.tutils import raises
|
2012-06-26 05:28:07 +00:00
|
|
|
import tutils
|
2016-02-27 13:36:17 +00:00
|
|
|
from test.mitmproxy.tutils import skip_windows
|
2012-06-26 05:28:07 +00:00
|
|
|
|
2014-09-06 23:38:44 +00:00
|
|
|
|
2013-03-02 03:57:00 +00:00
|
|
|
def test_response():
|
2016-02-08 14:10:16 +00:00
|
|
|
r = http.Response("HTTP/1.1", 200, "Message", {}, None, None)
|
2013-03-02 03:57:00 +00:00
|
|
|
assert repr(r)
|
|
|
|
|
2012-06-26 05:28:07 +00:00
|
|
|
|
2013-01-03 21:37:26 +00:00
|
|
|
class _TestDaemon:
|
2013-05-12 21:03:48 +00:00
|
|
|
ssloptions = pathod.SSLOptions()
|
2014-09-06 23:38:44 +00:00
|
|
|
|
2012-06-26 05:28:07 +00:00
|
|
|
@classmethod
|
2015-09-21 21:03:45 +00:00
|
|
|
def setup_class(cls):
|
|
|
|
cls.d = test.Daemon(
|
|
|
|
ssl=cls.ssl,
|
|
|
|
ssloptions=cls.ssloptions,
|
2015-06-18 16:12:11 +00:00
|
|
|
staticdir=tutils.test_data.path("data"),
|
|
|
|
anchors=[
|
2015-06-12 11:41:04 +00:00
|
|
|
(re.compile("/anchor/.*"), "202")
|
2014-10-25 02:30:54 +00:00
|
|
|
]
|
2012-06-26 05:28:07 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
@classmethod
|
2015-09-21 21:03:45 +00:00
|
|
|
def teardown_class(cls):
|
|
|
|
cls.d.shutdown()
|
2012-06-26 05:28:07 +00:00
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
self.d.clear_log()
|
|
|
|
|
|
|
|
def test_info(self):
|
2013-01-03 21:37:26 +00:00
|
|
|
c = pathoc.Pathoc(
|
2014-01-28 18:28:20 +00:00
|
|
|
("127.0.0.1", self.d.port),
|
2015-06-18 16:12:11 +00:00
|
|
|
ssl=self.ssl,
|
|
|
|
fp=None
|
2013-01-03 21:37:26 +00:00
|
|
|
)
|
2012-06-26 05:28:07 +00:00
|
|
|
c.connect()
|
2015-04-19 06:04:27 +00:00
|
|
|
resp = c.request("get:/api/info")
|
2015-09-26 15:40:22 +00:00
|
|
|
assert tuple(json.loads(resp.content)["version"]) == version.IVERSION
|
2012-06-26 05:28:07 +00:00
|
|
|
|
2014-10-25 02:30:54 +00:00
|
|
|
def tval(
|
|
|
|
self,
|
|
|
|
requests,
|
|
|
|
showreq=False,
|
|
|
|
showresp=False,
|
|
|
|
explain=False,
|
|
|
|
showssl=False,
|
|
|
|
hexdump=False,
|
|
|
|
timeout=None,
|
2015-04-20 03:42:33 +00:00
|
|
|
ignorecodes=(),
|
2015-04-19 06:04:27 +00:00
|
|
|
ignoretimeout=None,
|
|
|
|
showsummary=True
|
2014-10-25 02:30:54 +00:00
|
|
|
):
|
2016-03-20 18:40:03 +00:00
|
|
|
s = StringIO()
|
2015-04-19 06:04:27 +00:00
|
|
|
c = pathoc.Pathoc(
|
|
|
|
("127.0.0.1", self.d.port),
|
2015-06-18 16:12:11 +00:00
|
|
|
ssl=self.ssl,
|
|
|
|
showreq=showreq,
|
|
|
|
showresp=showresp,
|
|
|
|
explain=explain,
|
|
|
|
hexdump=hexdump,
|
|
|
|
ignorecodes=ignorecodes,
|
|
|
|
ignoretimeout=ignoretimeout,
|
|
|
|
showsummary=showsummary,
|
|
|
|
fp=s
|
2015-04-19 06:04:27 +00:00
|
|
|
)
|
2015-04-19 03:55:22 +00:00
|
|
|
c.connect(showssl=showssl, fp=s)
|
2014-03-02 06:04:56 +00:00
|
|
|
if timeout:
|
|
|
|
c.settimeout(timeout)
|
|
|
|
for i in requests:
|
2015-06-07 01:18:33 +00:00
|
|
|
r = language.parse_pathoc(i).next()
|
2014-10-25 21:50:32 +00:00
|
|
|
if explain:
|
2015-04-22 03:49:17 +00:00
|
|
|
r = r.freeze(language.Settings())
|
2015-04-19 06:04:27 +00:00
|
|
|
try:
|
|
|
|
c.request(r)
|
2015-09-17 00:13:42 +00:00
|
|
|
except NetlibException:
|
2015-04-19 06:04:27 +00:00
|
|
|
pass
|
2014-03-02 06:04:56 +00:00
|
|
|
return s.getvalue()
|
|
|
|
|
2013-01-03 21:37:26 +00:00
|
|
|
|
|
|
|
class TestDaemonSSL(_TestDaemon):
|
|
|
|
ssl = True
|
2015-04-18 22:43:16 +00:00
|
|
|
ssloptions = pathod.SSLOptions(
|
2015-06-18 16:12:11 +00:00
|
|
|
request_client_cert=True,
|
|
|
|
sans=["test1.com", "test2.com"],
|
2015-09-26 15:40:22 +00:00
|
|
|
alpn_select=b'h2',
|
2015-04-18 22:43:16 +00:00
|
|
|
)
|
2014-09-06 23:38:44 +00:00
|
|
|
|
2013-01-03 21:37:26 +00:00
|
|
|
def test_sni(self):
|
|
|
|
c = pathoc.Pathoc(
|
2014-01-28 18:28:20 +00:00
|
|
|
("127.0.0.1", self.d.port),
|
2015-06-18 16:12:11 +00:00
|
|
|
ssl=True,
|
|
|
|
sni="foobar.com",
|
|
|
|
fp=None
|
2013-01-03 21:37:26 +00:00
|
|
|
)
|
|
|
|
c.connect()
|
|
|
|
c.request("get:/p/200")
|
2013-02-26 20:07:16 +00:00
|
|
|
r = c.request("get:/api/log")
|
2015-09-26 15:40:22 +00:00
|
|
|
d = json.loads(r.content)
|
2013-01-03 21:37:26 +00:00
|
|
|
assert d["log"][0]["request"]["sni"] == "foobar.com"
|
|
|
|
|
2014-03-02 06:04:56 +00:00
|
|
|
def test_showssl(self):
|
2014-09-06 23:38:44 +00:00
|
|
|
assert "certificate chain" in self.tval(["get:/p/200"], showssl=True)
|
2014-03-02 06:04:56 +00:00
|
|
|
|
2013-01-20 09:37:43 +00:00
|
|
|
def test_clientcert(self):
|
|
|
|
c = pathoc.Pathoc(
|
2014-01-28 18:28:20 +00:00
|
|
|
("127.0.0.1", self.d.port),
|
2015-06-18 16:12:11 +00:00
|
|
|
ssl=True,
|
|
|
|
clientcert=tutils.test_data.path("data/clientcert/client.pem"),
|
|
|
|
fp=None
|
2013-01-20 09:37:43 +00:00
|
|
|
)
|
|
|
|
c.connect()
|
|
|
|
c.request("get:/p/200")
|
2013-02-26 20:07:16 +00:00
|
|
|
r = c.request("get:/api/log")
|
2015-09-26 15:40:22 +00:00
|
|
|
d = json.loads(r.content)
|
2013-01-20 09:37:43 +00:00
|
|
|
assert d["log"][0]["request"]["clientcert"]["keyinfo"]
|
|
|
|
|
2015-06-08 13:28:24 +00:00
|
|
|
def test_http2_without_ssl(self):
|
2016-03-20 18:40:03 +00:00
|
|
|
fp = StringIO()
|
2015-06-08 13:28:24 +00:00
|
|
|
c = pathoc.Pathoc(
|
|
|
|
("127.0.0.1", self.d.port),
|
2015-06-18 16:12:11 +00:00
|
|
|
use_http2=True,
|
|
|
|
ssl=False,
|
2015-06-24 22:33:35 +00:00
|
|
|
fp = fp
|
2015-06-08 13:28:24 +00:00
|
|
|
)
|
|
|
|
tutils.raises(NotImplementedError, c.connect)
|
|
|
|
|
2013-01-03 21:37:26 +00:00
|
|
|
|
|
|
|
class TestDaemon(_TestDaemon):
|
|
|
|
ssl = False
|
2014-09-06 23:38:44 +00:00
|
|
|
|
2013-01-03 21:37:26 +00:00
|
|
|
def test_ssl_error(self):
|
2015-06-18 16:12:11 +00:00
|
|
|
c = pathoc.Pathoc(("127.0.0.1", self.d.port), ssl=True, fp=None)
|
2013-01-03 21:37:26 +00:00
|
|
|
tutils.raises("ssl handshake", c.connect)
|
|
|
|
|
2014-03-02 06:04:56 +00:00
|
|
|
def test_showssl(self):
|
2016-05-29 09:43:29 +00:00
|
|
|
assert "certificate chain" not in self.tval(
|
2015-05-30 00:03:13 +00:00
|
|
|
["get:/p/200"],
|
|
|
|
showssl=True)
|
2014-03-02 06:04:56 +00:00
|
|
|
|
2012-09-26 21:44:25 +00:00
|
|
|
def test_ignorecodes(self):
|
2015-04-19 06:04:27 +00:00
|
|
|
assert "200" in self.tval(["get:'/p/200:b@1'"])
|
|
|
|
assert "200" in self.tval(["get:'/p/200:b@1'"])
|
2012-09-26 21:44:25 +00:00
|
|
|
assert "200" in self.tval(["get:'/p/200:b@1'"])
|
|
|
|
assert "200" not in self.tval(["get:'/p/200:b@1'"], ignorecodes=[200])
|
2015-05-30 00:03:13 +00:00
|
|
|
assert "200" not in self.tval(
|
|
|
|
["get:'/p/200:b@1'"],
|
|
|
|
ignorecodes=[
|
|
|
|
200,
|
|
|
|
201])
|
2012-09-26 21:44:25 +00:00
|
|
|
assert "202" in self.tval(["get:'/p/202:b@1'"], ignorecodes=[200, 201])
|
|
|
|
|
2012-09-25 23:07:22 +00:00
|
|
|
def test_timeout(self):
|
2015-06-08 02:01:04 +00:00
|
|
|
assert "Timeout" in self.tval(["get:'/p/200:p0,100'"], timeout=0.01)
|
2015-05-30 00:03:13 +00:00
|
|
|
assert "HTTP" in self.tval(
|
2015-06-04 07:55:01 +00:00
|
|
|
["get:'/p/200:p5,100'"],
|
2015-05-30 00:03:13 +00:00
|
|
|
showresp=True,
|
2015-06-08 04:34:21 +00:00
|
|
|
timeout=1
|
2015-06-04 07:55:01 +00:00
|
|
|
)
|
2016-05-29 09:43:29 +00:00
|
|
|
assert "HTTP" not in self.tval(
|
2015-06-08 04:34:21 +00:00
|
|
|
["get:'/p/200:p3,100'"],
|
2015-05-30 00:03:13 +00:00
|
|
|
showresp=True,
|
2015-06-08 04:34:21 +00:00
|
|
|
timeout=1,
|
2015-06-04 07:55:01 +00:00
|
|
|
ignoretimeout=True
|
|
|
|
)
|
2012-09-25 23:07:22 +00:00
|
|
|
|
2012-09-25 22:38:47 +00:00
|
|
|
def test_showresp(self):
|
2014-09-06 23:38:44 +00:00
|
|
|
reqs = ["get:/api/info:p0,0", "get:/api/info:p0,0"]
|
2012-09-25 22:12:30 +00:00
|
|
|
assert self.tval(reqs).count("200") == 2
|
2015-04-30 01:59:10 +00:00
|
|
|
assert self.tval(reqs, showresp=True).count("HTTP/1.1 200 OK") == 2
|
|
|
|
assert self.tval(
|
|
|
|
reqs, showresp=True, hexdump=True
|
|
|
|
).count("0000000000") == 2
|
2012-09-25 23:07:22 +00:00
|
|
|
|
|
|
|
def test_showresp_httperr(self):
|
2015-04-19 06:04:27 +00:00
|
|
|
v = self.tval(["get:'/p/200:d20'"], showresp=True, showsummary=True)
|
2012-09-25 23:07:22 +00:00
|
|
|
assert "Invalid headers" in v
|
|
|
|
assert "HTTP/" in v
|
2012-06-29 22:51:13 +00:00
|
|
|
|
2012-10-30 22:23:53 +00:00
|
|
|
def test_explain(self):
|
2014-10-25 02:30:54 +00:00
|
|
|
reqs = ["get:/p/200:b@100"]
|
|
|
|
assert "b@100" not in self.tval(reqs, explain=True)
|
2012-10-30 22:23:53 +00:00
|
|
|
|
2012-09-25 22:38:47 +00:00
|
|
|
def test_showreq(self):
|
2014-10-25 02:30:54 +00:00
|
|
|
reqs = ["get:/api/info:p0,0", "get:/api/info:p0,0"]
|
2015-05-03 01:54:52 +00:00
|
|
|
assert self.tval(reqs, showreq=True).count("GET /api") == 2
|
2015-04-30 01:59:10 +00:00
|
|
|
assert self.tval(
|
|
|
|
reqs, showreq=True, hexdump=True
|
|
|
|
).count("0000000000") == 2
|
2012-09-25 22:38:47 +00:00
|
|
|
|
2012-06-29 22:51:13 +00:00
|
|
|
def test_conn_err(self):
|
|
|
|
assert "Invalid server response" in self.tval(["get:'/p/200:d2'"])
|
2012-07-22 11:37:46 +00:00
|
|
|
|
2015-06-08 04:25:33 +00:00
|
|
|
def test_websocket_shutdown(self):
|
|
|
|
c = pathoc.Pathoc(("127.0.0.1", self.d.port), fp=None)
|
|
|
|
c.connect()
|
|
|
|
c.request("ws:/")
|
|
|
|
c.stop()
|
|
|
|
|
2016-02-27 13:36:17 +00:00
|
|
|
@skip_windows
|
2016-05-19 05:51:27 +00:00
|
|
|
@pytest.mark.skip(reason="race condition")
|
2015-06-08 04:25:33 +00:00
|
|
|
def test_wait_finish(self):
|
|
|
|
c = pathoc.Pathoc(
|
|
|
|
("127.0.0.1", self.d.port),
|
|
|
|
fp=None,
|
2015-06-18 16:12:11 +00:00
|
|
|
ws_read_limit=1
|
2015-06-08 04:25:33 +00:00
|
|
|
)
|
|
|
|
c.connect()
|
|
|
|
c.request("ws:/")
|
|
|
|
c.request("wf:f'wf:x100'")
|
|
|
|
[i for i in c.wait(timeout=0, finish=False)]
|
|
|
|
[i for i in c.wait(timeout=0)]
|
|
|
|
|
2013-03-02 03:57:00 +00:00
|
|
|
def test_connect_fail(self):
|
|
|
|
to = ("foobar", 80)
|
2015-04-30 01:59:10 +00:00
|
|
|
c = pathoc.Pathoc(("127.0.0.1", self.d.port), fp=None)
|
2016-03-20 18:40:03 +00:00
|
|
|
c.rfile, c.wfile = StringIO(), StringIO()
|
2015-09-16 16:44:34 +00:00
|
|
|
with raises("connect failed"):
|
|
|
|
c.http_connect(to)
|
2016-03-20 18:40:03 +00:00
|
|
|
c.rfile = StringIO(
|
2013-03-02 03:57:00 +00:00
|
|
|
"HTTP/1.1 500 OK\r\n"
|
|
|
|
)
|
2015-09-16 16:44:34 +00:00
|
|
|
with raises("connect failed"):
|
|
|
|
c.http_connect(to)
|
2016-03-20 18:40:03 +00:00
|
|
|
c.rfile = StringIO(
|
2013-03-02 03:57:00 +00:00
|
|
|
"HTTP/1.1 200 OK\r\n"
|
|
|
|
)
|
2013-12-15 05:42:58 +00:00
|
|
|
c.http_connect(to)
|
2015-06-08 13:28:24 +00:00
|
|
|
|
2015-07-03 00:48:35 +00:00
|
|
|
def test_socks_connect(self):
|
|
|
|
to = ("foobar", 80)
|
|
|
|
c = pathoc.Pathoc(("127.0.0.1", self.d.port), fp=None)
|
2016-03-20 18:40:03 +00:00
|
|
|
c.rfile, c.wfile = tutils.treader(""), StringIO()
|
2015-07-03 00:48:35 +00:00
|
|
|
tutils.raises(pathoc.PathocError, c.socks_connect, to)
|
|
|
|
|
|
|
|
c.rfile = tutils.treader(
|
|
|
|
"\x05\xEE"
|
|
|
|
)
|
|
|
|
tutils.raises("SOCKS without authentication", c.socks_connect, ("example.com", 0xDEAD))
|
|
|
|
|
|
|
|
c.rfile = tutils.treader(
|
|
|
|
"\x05\x00" +
|
|
|
|
"\x05\xEE\x00\x03\x0bexample.com\xDE\xAD"
|
|
|
|
)
|
|
|
|
tutils.raises("SOCKS server error", c.socks_connect, ("example.com", 0xDEAD))
|
|
|
|
|
|
|
|
c.rfile = tutils.treader(
|
|
|
|
"\x05\x00" +
|
|
|
|
"\x05\x00\x00\x03\x0bexample.com\xDE\xAD"
|
|
|
|
)
|
|
|
|
c.socks_connect(("example.com", 0xDEAD))
|
|
|
|
|
2015-06-08 13:28:24 +00:00
|
|
|
|
|
|
|
class TestDaemonHTTP2(_TestDaemon):
|
|
|
|
ssl = True
|
|
|
|
|
2016-02-15 17:43:06 +00:00
|
|
|
if tcp.HAS_ALPN:
|
2015-06-18 08:36:58 +00:00
|
|
|
|
|
|
|
def test_http2(self):
|
|
|
|
c = pathoc.Pathoc(
|
|
|
|
("127.0.0.1", self.d.port),
|
2015-07-24 15:58:35 +00:00
|
|
|
fp=None,
|
2015-06-18 16:12:11 +00:00
|
|
|
ssl=True,
|
2015-07-24 15:58:35 +00:00
|
|
|
use_http2=True,
|
2015-06-18 08:36:58 +00:00
|
|
|
)
|
|
|
|
assert isinstance(c.protocol, http2.HTTP2Protocol)
|
|
|
|
|
|
|
|
c = pathoc.Pathoc(
|
|
|
|
("127.0.0.1", self.d.port),
|
|
|
|
)
|
2015-09-16 16:44:34 +00:00
|
|
|
assert c.protocol == http1
|
2015-06-18 08:36:58 +00:00
|
|
|
|
|
|
|
def test_http2_alpn(self):
|
|
|
|
c = pathoc.Pathoc(
|
|
|
|
("127.0.0.1", self.d.port),
|
2015-07-24 15:58:35 +00:00
|
|
|
fp=None,
|
2015-06-18 16:12:11 +00:00
|
|
|
ssl=True,
|
|
|
|
use_http2=True,
|
|
|
|
http2_skip_connection_preface=True,
|
2015-06-18 08:36:58 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
tmp_convert_to_ssl = c.convert_to_ssl
|
|
|
|
c.convert_to_ssl = Mock()
|
|
|
|
c.convert_to_ssl.side_effect = tmp_convert_to_ssl
|
|
|
|
c.connect()
|
|
|
|
|
|
|
|
_, kwargs = c.convert_to_ssl.call_args
|
2015-08-28 15:35:22 +00:00
|
|
|
assert set(kwargs['alpn_protos']) == set([b'http/1.1', b'h2'])
|
2015-06-18 08:36:58 +00:00
|
|
|
|
|
|
|
def test_request(self):
|
|
|
|
c = pathoc.Pathoc(
|
|
|
|
("127.0.0.1", self.d.port),
|
2015-07-24 15:58:35 +00:00
|
|
|
fp=None,
|
2015-06-18 16:12:11 +00:00
|
|
|
ssl=True,
|
|
|
|
use_http2=True,
|
2015-06-18 08:36:58 +00:00
|
|
|
)
|
|
|
|
c.connect()
|
|
|
|
resp = c.request("get:/p/200")
|
2015-07-29 09:26:10 +00:00
|
|
|
assert resp.status_code == 200
|