2016-07-14 04:20:27 +00:00
|
|
|
from mitmproxy import contentviews
|
2017-02-01 15:48:46 +00:00
|
|
|
from mitmproxy.test import tflow
|
2016-11-01 20:44:18 +00:00
|
|
|
from mitmproxy.test import tutils
|
2017-04-25 07:06:24 +00:00
|
|
|
from mitmproxy.test import taddons
|
2016-10-19 22:56:38 +00:00
|
|
|
from mitmproxy.net.http import Headers
|
2016-08-03 10:58:41 +00:00
|
|
|
|
2017-03-22 11:02:18 +00:00
|
|
|
from ..mitmproxy import tservers
|
2016-03-07 03:42:10 +00:00
|
|
|
|
2016-11-01 20:44:18 +00:00
|
|
|
example_dir = tutils.test_data.push("../examples")
|
2016-03-07 03:49:29 +00:00
|
|
|
|
2016-05-19 01:46:42 +00:00
|
|
|
|
2017-02-10 21:12:24 +00:00
|
|
|
class TestScripts(tservers.MasterTest):
|
2016-07-14 04:20:27 +00:00
|
|
|
def test_add_header(self):
|
2017-04-25 19:13:36 +00:00
|
|
|
with taddons.context() as tctx:
|
|
|
|
a = tctx.script(example_dir.path("simple/add_header.py"))
|
|
|
|
f = tflow.tflow(resp=tutils.tresp())
|
|
|
|
a.response(f)
|
|
|
|
assert f.response.headers["newheader"] == "foo"
|
2016-03-09 18:21:29 +00:00
|
|
|
|
2016-07-14 04:20:27 +00:00
|
|
|
def test_custom_contentviews(self):
|
2017-04-25 19:13:36 +00:00
|
|
|
with taddons.context() as tctx:
|
|
|
|
tctx.script(example_dir.path("simple/custom_contentview.py"))
|
|
|
|
swapcase = contentviews.get("swapcase")
|
|
|
|
_, fmt = swapcase(b"<html>Test!</html>")
|
|
|
|
assert any(b'tEST!' in val[0][1] for val in fmt)
|
2016-07-07 08:21:15 +00:00
|
|
|
|
2016-07-14 04:20:27 +00:00
|
|
|
def test_iframe_injector(self):
|
2017-04-25 07:06:24 +00:00
|
|
|
with taddons.context() as tctx:
|
|
|
|
sc = tctx.script(example_dir.path("simple/modify_body_inject_iframe.py"))
|
|
|
|
tctx.configure(
|
|
|
|
sc,
|
|
|
|
iframe = "http://example.org/evil_iframe"
|
|
|
|
)
|
|
|
|
f = tflow.tflow(
|
|
|
|
resp=tutils.tresp(content=b"<html><body>mitmproxy</body></html>")
|
|
|
|
)
|
|
|
|
tctx.master.addons.invoke_addon(sc, "response", f)
|
|
|
|
content = f.response.content
|
|
|
|
assert b'iframe' in content and b'evil_iframe' in content
|
2016-07-14 04:20:27 +00:00
|
|
|
|
|
|
|
def test_modify_form(self):
|
2017-04-25 19:13:36 +00:00
|
|
|
with taddons.context() as tctx:
|
|
|
|
sc = tctx.script(example_dir.path("simple/modify_form.py"))
|
2016-07-14 04:20:27 +00:00
|
|
|
|
2017-04-25 19:13:36 +00:00
|
|
|
form_header = Headers(content_type="application/x-www-form-urlencoded")
|
|
|
|
f = tflow.tflow(req=tutils.treq(headers=form_header))
|
|
|
|
sc.request(f)
|
2016-07-14 04:20:27 +00:00
|
|
|
|
2017-04-25 19:13:36 +00:00
|
|
|
assert f.request.urlencoded_form["mitmproxy"] == "rocks"
|
2016-07-14 04:20:27 +00:00
|
|
|
|
2017-04-25 19:13:36 +00:00
|
|
|
f.request.headers["content-type"] = ""
|
|
|
|
sc.request(f)
|
|
|
|
assert list(f.request.urlencoded_form.items()) == [("foo", "bar")]
|
2016-07-14 04:20:27 +00:00
|
|
|
|
|
|
|
def test_modify_querystring(self):
|
2017-04-25 19:13:36 +00:00
|
|
|
with taddons.context() as tctx:
|
|
|
|
sc = tctx.script(example_dir.path("simple/modify_querystring.py"))
|
|
|
|
f = tflow.tflow(req=tutils.treq(path="/search?q=term"))
|
2016-07-14 04:20:27 +00:00
|
|
|
|
2017-04-25 19:13:36 +00:00
|
|
|
sc.request(f)
|
|
|
|
assert f.request.query["mitmproxy"] == "rocks"
|
2016-07-14 04:20:27 +00:00
|
|
|
|
2017-04-25 19:13:36 +00:00
|
|
|
f.request.path = "/"
|
|
|
|
sc.request(f)
|
|
|
|
assert f.request.query["mitmproxy"] == "rocks"
|
2016-07-14 04:20:27 +00:00
|
|
|
|
|
|
|
def test_redirect_requests(self):
|
2017-04-25 19:13:36 +00:00
|
|
|
with taddons.context() as tctx:
|
|
|
|
sc = tctx.script(example_dir.path("simple/redirect_requests.py"))
|
|
|
|
f = tflow.tflow(req=tutils.treq(host="example.org"))
|
|
|
|
sc.request(f)
|
|
|
|
assert f.request.host == "mitmproxy.org"
|
2016-07-14 04:20:27 +00:00
|
|
|
|
2016-11-21 01:16:20 +00:00
|
|
|
def test_send_reply_from_proxy(self):
|
2017-04-25 19:13:36 +00:00
|
|
|
with taddons.context() as tctx:
|
|
|
|
sc = tctx.script(example_dir.path("simple/send_reply_from_proxy.py"))
|
|
|
|
f = tflow.tflow(req=tutils.treq(host="example.com", port=80))
|
|
|
|
sc.request(f)
|
|
|
|
assert f.response.content == b"Hello World"
|
2016-11-21 01:16:20 +00:00
|
|
|
|
2017-01-30 22:44:13 +00:00
|
|
|
def test_dns_spoofing(self):
|
2017-04-25 19:13:36 +00:00
|
|
|
with taddons.context() as tctx:
|
|
|
|
sc = tctx.script(example_dir.path("complex/dns_spoofing.py"))
|
|
|
|
|
|
|
|
original_host = "example.com"
|
2017-01-30 22:44:13 +00:00
|
|
|
|
2017-04-25 19:13:36 +00:00
|
|
|
host_header = Headers(host=original_host)
|
|
|
|
f = tflow.tflow(req=tutils.treq(headers=host_header, port=80))
|
2017-01-30 22:44:13 +00:00
|
|
|
|
2017-04-25 19:13:36 +00:00
|
|
|
tctx.master.addons.invoke_addon(sc, "requestheaders", f)
|
2017-01-30 22:44:13 +00:00
|
|
|
|
2017-04-25 19:13:36 +00:00
|
|
|
# Rewrite by reverse proxy mode
|
|
|
|
f.request.scheme = "https"
|
|
|
|
f.request.port = 443
|
2017-01-30 22:44:13 +00:00
|
|
|
|
2017-04-25 19:13:36 +00:00
|
|
|
tctx.master.addons.invoke_addon(sc, "request", f)
|
2017-01-31 22:23:13 +00:00
|
|
|
|
2017-04-25 19:13:36 +00:00
|
|
|
assert f.request.scheme == "http"
|
|
|
|
assert f.request.port == 80
|
2017-01-31 22:23:13 +00:00
|
|
|
|
2017-04-25 19:13:36 +00:00
|
|
|
assert f.request.headers["Host"] == original_host
|