2010-02-16 04:09:07 +00:00
|
|
|
"""
|
|
|
|
A simple proxy server implementation, which always reads all of a server
|
|
|
|
response into memory, performs some transformation, and then writes it back
|
2011-07-16 09:47:06 +00:00
|
|
|
to the client.
|
2010-02-16 04:09:07 +00:00
|
|
|
"""
|
2011-08-18 21:22:25 +00:00
|
|
|
import sys, os, string, socket, time
|
2011-08-03 10:38:23 +00:00
|
|
|
import shutil, tempfile, threading
|
2011-02-19 23:53:42 +00:00
|
|
|
import optparse, SocketServer, ssl
|
2011-08-03 22:34:34 +00:00
|
|
|
import utils, flow
|
2010-02-16 04:09:07 +00:00
|
|
|
|
|
|
|
NAME = "mitmproxy"
|
|
|
|
|
|
|
|
|
|
|
|
class ProxyError(Exception):
|
|
|
|
def __init__(self, code, msg):
|
|
|
|
self.code, self.msg = code, msg
|
|
|
|
|
|
|
|
def __str__(self):
|
|
|
|
return "ProxyError(%s, %s)"%(self.code, self.msg)
|
|
|
|
|
|
|
|
|
2011-09-09 02:49:34 +00:00
|
|
|
class ProxyConfig:
|
2012-02-18 01:45:22 +00:00
|
|
|
def __init__(self, certfile = None, ciphers = None, cacert = None, cert_wait_time=0, body_size_limit = None, reverse_proxy=None):
|
2011-02-08 17:00:59 +00:00
|
|
|
self.certfile = certfile
|
2011-02-08 15:58:38 +00:00
|
|
|
self.ciphers = ciphers
|
2011-02-08 17:00:59 +00:00
|
|
|
self.cacert = cacert
|
2011-02-20 00:29:41 +00:00
|
|
|
self.certdir = None
|
2011-06-27 04:10:17 +00:00
|
|
|
self.cert_wait_time = cert_wait_time
|
2011-09-09 03:27:31 +00:00
|
|
|
self.body_size_limit = body_size_limit
|
2012-02-18 01:45:22 +00:00
|
|
|
self.reverse_proxy = reverse_proxy
|
2010-02-16 04:09:07 +00:00
|
|
|
|
|
|
|
|
2011-09-09 02:49:34 +00:00
|
|
|
def read_chunked(fp, limit):
|
2010-11-12 15:01:17 +00:00
|
|
|
content = ""
|
2011-09-09 02:49:34 +00:00
|
|
|
total = 0
|
2010-11-12 15:01:17 +00:00
|
|
|
while 1:
|
2011-09-09 02:49:34 +00:00
|
|
|
line = fp.readline(128)
|
2010-11-12 15:01:17 +00:00
|
|
|
if line == "":
|
|
|
|
raise IOError("Connection closed")
|
|
|
|
if line == '\r\n' or line == '\n':
|
|
|
|
continue
|
2011-09-09 02:49:34 +00:00
|
|
|
try:
|
|
|
|
length = int(line,16)
|
|
|
|
except ValueError:
|
|
|
|
# FIXME: Not strictly correct - this could be from the server, in which
|
|
|
|
# case we should send a 502.
|
|
|
|
raise ProxyError(400, "Invalid chunked encoding length: %s"%line)
|
2010-11-12 15:01:17 +00:00
|
|
|
if not length:
|
|
|
|
break
|
2011-09-09 02:49:34 +00:00
|
|
|
total += length
|
|
|
|
if limit is not None and total > limit:
|
|
|
|
msg = "HTTP Body too large."\
|
|
|
|
" Limit is %s, chunked content length was at least %s"%(limit, total)
|
|
|
|
raise ProxyError(509, msg)
|
2010-11-12 15:01:17 +00:00
|
|
|
content += fp.read(length)
|
2011-09-09 02:49:34 +00:00
|
|
|
line = fp.readline(5)
|
2010-11-12 15:01:17 +00:00
|
|
|
if line != '\r\n':
|
|
|
|
raise IOError("Malformed chunked body")
|
|
|
|
while 1:
|
|
|
|
line = fp.readline()
|
|
|
|
if line == "":
|
|
|
|
raise IOError("Connection closed")
|
|
|
|
if line == '\r\n' or line == '\n':
|
|
|
|
break
|
|
|
|
return content
|
2011-07-16 09:47:06 +00:00
|
|
|
|
2010-11-12 15:01:17 +00:00
|
|
|
|
2011-09-09 02:49:34 +00:00
|
|
|
def read_http_body(rfile, connection, headers, all, limit):
|
2011-07-14 03:59:27 +00:00
|
|
|
if 'transfer-encoding' in headers:
|
2010-11-12 15:01:17 +00:00
|
|
|
if not ",".join(headers["transfer-encoding"]) == "chunked":
|
|
|
|
raise IOError('Invalid transfer-encoding')
|
2011-09-09 02:49:34 +00:00
|
|
|
content = read_chunked(rfile, limit)
|
2011-07-14 03:59:27 +00:00
|
|
|
elif "content-length" in headers:
|
2011-09-09 02:49:34 +00:00
|
|
|
try:
|
|
|
|
l = int(headers["content-length"][0])
|
|
|
|
except ValueError:
|
|
|
|
# FIXME: Not strictly correct - this could be from the server, in which
|
|
|
|
# case we should send a 502.
|
|
|
|
raise ProxyError(400, "Invalid content-length header: %s"%headers["content-length"])
|
|
|
|
if limit is not None and l > limit:
|
|
|
|
raise ProxyError(509, "HTTP Body too large. Limit is %s, content-length was %s"%(limit, l))
|
|
|
|
content = rfile.read(l)
|
2010-11-12 15:01:17 +00:00
|
|
|
elif all:
|
2011-09-09 02:49:34 +00:00
|
|
|
content = rfile.read(limit if limit else None)
|
2010-11-12 15:01:17 +00:00
|
|
|
connection.close = True
|
|
|
|
else:
|
2011-02-16 02:10:00 +00:00
|
|
|
content = ""
|
2010-11-12 15:01:17 +00:00
|
|
|
return content
|
|
|
|
|
|
|
|
|
|
|
|
def parse_request_line(request):
|
2010-02-16 04:09:07 +00:00
|
|
|
"""
|
2011-02-10 22:06:30 +00:00
|
|
|
Parse a proxy request line. Return (method, scheme, host, port, path, minor).
|
2010-02-16 04:09:07 +00:00
|
|
|
Raise ProxyError on error.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
method, url, protocol = string.split(request)
|
|
|
|
except ValueError:
|
|
|
|
raise ProxyError(400, "Can't parse request")
|
2010-11-12 15:01:17 +00:00
|
|
|
if method == 'CONNECT':
|
|
|
|
scheme = None
|
|
|
|
path = None
|
|
|
|
try:
|
|
|
|
host, port = url.split(":")
|
|
|
|
except ValueError:
|
|
|
|
raise ProxyError(400, "Can't parse request")
|
|
|
|
port = int(port)
|
|
|
|
else:
|
|
|
|
if url.startswith("/") or url == "*":
|
2010-02-16 04:09:07 +00:00
|
|
|
scheme, port, host, path = None, None, None, url
|
|
|
|
else:
|
2011-08-03 10:38:23 +00:00
|
|
|
parts = utils.parse_url(url)
|
2010-02-16 04:09:07 +00:00
|
|
|
if not parts:
|
|
|
|
raise ProxyError(400, "Invalid url: %s"%url)
|
|
|
|
scheme, host, port, path = parts
|
2010-11-12 15:01:17 +00:00
|
|
|
if not protocol.startswith("HTTP/"):
|
|
|
|
raise ProxyError(400, "Unsupported protocol")
|
|
|
|
major,minor = protocol.split('/')[1].split('.')
|
|
|
|
major = int(major)
|
|
|
|
minor = int(minor)
|
|
|
|
if major != 1:
|
|
|
|
raise ProxyError(400, "Unsupported protocol")
|
|
|
|
return method, scheme, host, port, path, minor
|
2012-01-20 23:43:00 +00:00
|
|
|
|
2011-07-31 22:41:12 +00:00
|
|
|
|
2010-02-16 04:09:07 +00:00
|
|
|
class FileLike:
|
|
|
|
def __init__(self, o):
|
|
|
|
self.o = o
|
|
|
|
|
|
|
|
def __getattr__(self, attr):
|
|
|
|
return getattr(self.o, attr)
|
|
|
|
|
|
|
|
def flush(self):
|
|
|
|
pass
|
|
|
|
|
2010-09-05 13:04:22 +00:00
|
|
|
def read(self, length):
|
2010-09-05 23:21:51 +00:00
|
|
|
result = ''
|
|
|
|
while len(result) < length:
|
2011-06-23 05:00:55 +00:00
|
|
|
try:
|
|
|
|
data = self.o.read(length)
|
|
|
|
except AttributeError:
|
|
|
|
break
|
2010-09-05 23:21:51 +00:00
|
|
|
if not data:
|
|
|
|
break
|
|
|
|
result += data
|
|
|
|
return result
|
|
|
|
|
2010-02-16 04:09:07 +00:00
|
|
|
def readline(self):
|
|
|
|
result = ''
|
|
|
|
while True:
|
|
|
|
ch = self.read(1)
|
|
|
|
if not ch:
|
|
|
|
break
|
|
|
|
else:
|
|
|
|
result += ch
|
|
|
|
if ch == '\n':
|
|
|
|
break
|
|
|
|
return result
|
|
|
|
|
|
|
|
|
2011-02-02 23:16:03 +00:00
|
|
|
#begin nocover
|
2011-08-03 10:38:23 +00:00
|
|
|
class RequestReplayThread(threading.Thread):
|
2012-02-18 01:45:22 +00:00
|
|
|
def __init__(self, config, flow, masterq):
|
|
|
|
self.config, self.flow, self.masterq = config, flow, masterq
|
2011-08-03 10:38:23 +00:00
|
|
|
threading.Thread.__init__(self)
|
|
|
|
|
|
|
|
def run(self):
|
|
|
|
try:
|
2012-02-18 01:45:22 +00:00
|
|
|
server = ServerConnection(self.config, self.flow.request)
|
|
|
|
server.send()
|
2011-08-03 10:38:23 +00:00
|
|
|
response = server.read_response()
|
2011-08-03 11:02:33 +00:00
|
|
|
response._send(self.masterq)
|
2011-08-03 10:38:23 +00:00
|
|
|
except ProxyError, v:
|
|
|
|
err = flow.Error(self.flow.request, v.msg)
|
2011-08-03 11:02:33 +00:00
|
|
|
err._send(self.masterq)
|
2011-08-03 10:38:23 +00:00
|
|
|
|
2011-02-02 23:16:03 +00:00
|
|
|
|
2010-02-16 04:09:07 +00:00
|
|
|
class ServerConnection:
|
2012-02-18 01:45:22 +00:00
|
|
|
def __init__(self, config, request):
|
|
|
|
self.config, self.request = config, request
|
|
|
|
if config.reverse_proxy:
|
|
|
|
self.scheme, self.host, self.port = config.reverse_proxy
|
|
|
|
else:
|
|
|
|
self.host = request.host
|
|
|
|
self.port = request.port
|
|
|
|
self.scheme = request.scheme
|
2010-11-12 15:01:17 +00:00
|
|
|
self.close = False
|
2010-02-16 04:09:07 +00:00
|
|
|
self.server, self.rfile, self.wfile = None, None, None
|
|
|
|
self.connect()
|
|
|
|
|
|
|
|
def connect(self):
|
|
|
|
try:
|
2010-11-12 15:01:17 +00:00
|
|
|
addr = socket.gethostbyname(self.host)
|
2010-02-16 04:09:07 +00:00
|
|
|
server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
2010-11-12 15:01:17 +00:00
|
|
|
if self.scheme == "https":
|
2010-02-16 04:09:07 +00:00
|
|
|
server = ssl.wrap_socket(server)
|
2010-11-12 15:01:17 +00:00
|
|
|
server.connect((addr, self.port))
|
2010-02-16 04:09:07 +00:00
|
|
|
except socket.error, err:
|
2011-09-09 02:49:34 +00:00
|
|
|
raise ProxyError(502, 'Error connecting to "%s": %s' % (self.host, err))
|
2010-02-16 04:09:07 +00:00
|
|
|
self.server = server
|
|
|
|
self.rfile, self.wfile = server.makefile('rb'), server.makefile('wb')
|
|
|
|
|
2012-02-18 01:45:22 +00:00
|
|
|
def send(self):
|
|
|
|
self.request.close = self.close
|
2010-02-16 04:09:07 +00:00
|
|
|
try:
|
2012-02-18 01:45:22 +00:00
|
|
|
self.wfile.write(self.request._assemble())
|
2010-02-16 04:09:07 +00:00
|
|
|
self.wfile.flush()
|
|
|
|
except socket.error, err:
|
2012-02-18 01:45:22 +00:00
|
|
|
raise ProxyError(502, 'Error sending data to "%s": %s' % (self.request.host, err))
|
2010-02-16 04:09:07 +00:00
|
|
|
|
|
|
|
def read_response(self):
|
2010-11-12 15:01:17 +00:00
|
|
|
line = self.rfile.readline()
|
|
|
|
if line == "\r\n" or line == "\n": # Possible leftover from previous message
|
|
|
|
line = self.rfile.readline()
|
|
|
|
if not line:
|
|
|
|
raise ProxyError(502, "Blank server response.")
|
|
|
|
parts = line.strip().split(" ", 2)
|
2011-09-25 21:44:43 +00:00
|
|
|
if len(parts) == 2: # handle missing message gracefully
|
|
|
|
parts.append("")
|
2010-02-16 04:09:07 +00:00
|
|
|
if not len(parts) == 3:
|
2010-11-12 15:01:17 +00:00
|
|
|
raise ProxyError(502, "Invalid server response: %s."%line)
|
2010-02-16 04:09:07 +00:00
|
|
|
proto, code, msg = parts
|
2011-09-04 19:47:47 +00:00
|
|
|
try:
|
|
|
|
code = int(code)
|
|
|
|
except ValueError:
|
|
|
|
raise ProxyError(502, "Invalid server response: %s."%line)
|
2011-08-03 10:38:23 +00:00
|
|
|
headers = flow.Headers()
|
2010-02-16 04:09:07 +00:00
|
|
|
headers.read(self.rfile)
|
2010-11-12 15:01:17 +00:00
|
|
|
if code >= 100 and code <= 199:
|
|
|
|
return self.read_response()
|
|
|
|
if self.request.method == "HEAD" or code == 204 or code == 304:
|
2011-02-16 03:43:35 +00:00
|
|
|
content = ""
|
2010-02-16 04:09:07 +00:00
|
|
|
else:
|
2012-02-18 01:45:22 +00:00
|
|
|
content = read_http_body(self.rfile, self, headers, True, self.config.body_size_limit)
|
2011-08-03 10:38:23 +00:00
|
|
|
return flow.Response(self.request, code, msg, headers, content)
|
2010-02-16 04:09:07 +00:00
|
|
|
|
|
|
|
def terminate(self):
|
|
|
|
try:
|
|
|
|
if not self.wfile.closed:
|
|
|
|
self.wfile.flush()
|
|
|
|
self.server.close()
|
|
|
|
except IOError:
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
class ProxyHandler(SocketServer.StreamRequestHandler):
|
2011-02-19 23:53:42 +00:00
|
|
|
def __init__(self, config, request, client_address, server, q):
|
|
|
|
self.config = config
|
2010-02-16 04:09:07 +00:00
|
|
|
self.mqueue = q
|
|
|
|
SocketServer.StreamRequestHandler.__init__(self, request, client_address, server)
|
|
|
|
|
|
|
|
def handle(self):
|
2011-08-03 10:38:23 +00:00
|
|
|
cc = flow.ClientConnect(self.client_address)
|
2011-08-03 11:02:33 +00:00
|
|
|
cc._send(self.mqueue)
|
2010-11-12 15:01:17 +00:00
|
|
|
while not cc.close:
|
|
|
|
self.handle_request(cc)
|
2011-08-03 10:38:23 +00:00
|
|
|
cd = flow.ClientDisconnect(cc)
|
2011-08-03 11:02:33 +00:00
|
|
|
cd._send(self.mqueue)
|
2010-11-12 15:01:17 +00:00
|
|
|
self.finish()
|
|
|
|
|
|
|
|
def handle_request(self, cc):
|
2011-03-11 00:06:51 +00:00
|
|
|
server, request, err = None, None, None
|
2010-02-16 04:09:07 +00:00
|
|
|
try:
|
2011-07-23 01:37:06 +00:00
|
|
|
try:
|
|
|
|
request = self.read_request(cc)
|
|
|
|
except IOError, v:
|
|
|
|
raise IOError, "Reading request: %s"%v
|
2010-11-12 15:01:17 +00:00
|
|
|
if request is None:
|
|
|
|
cc.close = True
|
|
|
|
return
|
2011-07-23 01:37:06 +00:00
|
|
|
cc.requestcount += 1
|
2011-08-03 11:02:33 +00:00
|
|
|
request = request._send(self.mqueue)
|
2011-01-27 00:32:24 +00:00
|
|
|
if request is None:
|
2010-11-12 15:01:17 +00:00
|
|
|
cc.close = True
|
2010-02-16 04:09:07 +00:00
|
|
|
return
|
2011-02-16 09:37:04 +00:00
|
|
|
|
2012-02-10 02:22:26 +00:00
|
|
|
if isinstance(request, flow.Response):
|
2010-11-12 12:18:42 +00:00
|
|
|
response = request
|
|
|
|
request = False
|
2011-08-03 11:02:33 +00:00
|
|
|
response = response._send(self.mqueue)
|
2010-11-12 12:18:42 +00:00
|
|
|
else:
|
2012-02-18 01:45:22 +00:00
|
|
|
server = ServerConnection(self.config, request)
|
|
|
|
server.send()
|
2011-07-23 01:37:06 +00:00
|
|
|
try:
|
|
|
|
response = server.read_response()
|
|
|
|
except IOError, v:
|
|
|
|
raise IOError, "Reading response: %s"%v
|
2011-08-03 11:02:33 +00:00
|
|
|
response = response._send(self.mqueue)
|
2010-11-12 12:18:42 +00:00
|
|
|
if response is None:
|
|
|
|
server.terminate()
|
2011-01-27 00:32:24 +00:00
|
|
|
if response is None:
|
2010-11-12 15:01:17 +00:00
|
|
|
cc.close = True
|
2010-02-16 04:09:07 +00:00
|
|
|
return
|
|
|
|
self.send_response(response)
|
2011-07-23 01:37:06 +00:00
|
|
|
except IOError, v:
|
|
|
|
cc.connection_error = v
|
2011-06-23 05:00:55 +00:00
|
|
|
cc.close = True
|
2010-02-16 04:09:07 +00:00
|
|
|
except ProxyError, e:
|
2010-11-12 15:01:17 +00:00
|
|
|
cc.close = True
|
2011-07-23 01:37:06 +00:00
|
|
|
cc.connection_error = "%s: %s"%(e.code, e.msg)
|
|
|
|
if request:
|
2011-08-03 10:38:23 +00:00
|
|
|
err = flow.Error(request, e.msg)
|
2011-08-03 11:02:33 +00:00
|
|
|
err._send(self.mqueue)
|
2011-07-23 01:37:06 +00:00
|
|
|
self.send_error(e.code, e.msg)
|
2010-02-16 04:09:07 +00:00
|
|
|
if server:
|
|
|
|
server.terminate()
|
|
|
|
|
2011-02-19 23:53:42 +00:00
|
|
|
def find_cert(self, host):
|
|
|
|
if self.config.certfile:
|
|
|
|
return self.config.certfile
|
2011-02-08 17:00:59 +00:00
|
|
|
else:
|
2011-02-20 00:29:41 +00:00
|
|
|
ret = utils.dummy_cert(self.config.certdir, self.config.cacert, host)
|
2011-06-27 04:10:17 +00:00
|
|
|
time.sleep(self.config.cert_wait_time)
|
2011-02-19 23:53:42 +00:00
|
|
|
if not ret:
|
2011-09-09 02:49:34 +00:00
|
|
|
raise ProxyError(502, "mitmproxy: Unable to generate dummy cert.")
|
2011-02-19 23:53:42 +00:00
|
|
|
return ret
|
2011-02-08 17:00:59 +00:00
|
|
|
|
2011-02-03 01:51:32 +00:00
|
|
|
def read_request(self, client_conn):
|
2010-11-12 15:01:17 +00:00
|
|
|
line = self.rfile.readline()
|
|
|
|
if line == "\r\n" or line == "\n": # Possible leftover from previous message
|
|
|
|
line = self.rfile.readline()
|
|
|
|
if line == "":
|
|
|
|
return None
|
|
|
|
method, scheme, host, port, path, httpminor = parse_request_line(line)
|
2010-02-16 04:09:07 +00:00
|
|
|
if method == "CONNECT":
|
|
|
|
# Discard additional headers sent to the proxy. Should I expose
|
|
|
|
# these to users?
|
|
|
|
while 1:
|
|
|
|
d = self.rfile.readline()
|
2010-11-12 15:01:17 +00:00
|
|
|
if d == '\r\n' or d == '\n':
|
2010-02-16 04:09:07 +00:00
|
|
|
break
|
2011-02-08 14:07:29 +00:00
|
|
|
self.wfile.write(
|
|
|
|
'HTTP/1.1 200 Connection established\r\n' +
|
|
|
|
('Proxy-agent: %s\r\n'%NAME) +
|
|
|
|
'\r\n'
|
|
|
|
)
|
2010-02-16 04:09:07 +00:00
|
|
|
self.wfile.flush()
|
2011-02-10 22:06:30 +00:00
|
|
|
kwargs = dict(
|
2011-02-19 23:53:42 +00:00
|
|
|
certfile = self.find_cert(host),
|
|
|
|
keyfile = self.config.certfile or self.config.cacert,
|
2010-02-16 04:09:07 +00:00
|
|
|
server_side = True,
|
|
|
|
ssl_version = ssl.PROTOCOL_SSLv23,
|
2011-07-23 04:59:48 +00:00
|
|
|
do_handshake_on_connect = True,
|
2010-02-16 04:09:07 +00:00
|
|
|
)
|
2011-02-10 22:06:30 +00:00
|
|
|
if sys.version_info[1] > 6:
|
2011-02-19 23:53:42 +00:00
|
|
|
kwargs["ciphers"] = self.config.ciphers
|
2011-02-10 22:06:30 +00:00
|
|
|
self.connection = ssl.wrap_socket(self.connection, **kwargs)
|
2010-02-16 04:09:07 +00:00
|
|
|
self.rfile = FileLike(self.connection)
|
|
|
|
self.wfile = FileLike(self.connection)
|
2010-11-12 15:01:17 +00:00
|
|
|
method, scheme, host, port, path, httpminor = parse_request_line(self.rfile.readline())
|
|
|
|
if scheme is None:
|
2010-02-16 04:09:07 +00:00
|
|
|
scheme = "https"
|
2011-08-03 10:38:23 +00:00
|
|
|
headers = flow.Headers()
|
2010-02-16 04:09:07 +00:00
|
|
|
headers.read(self.rfile)
|
2011-07-14 03:59:27 +00:00
|
|
|
if host is None and "host" in headers:
|
2010-11-12 15:01:17 +00:00
|
|
|
netloc = headers["host"][0]
|
|
|
|
if ':' in netloc:
|
|
|
|
host, port = string.split(netloc, ':')
|
|
|
|
port = int(port)
|
|
|
|
else:
|
|
|
|
host = netloc
|
|
|
|
if scheme == "https":
|
|
|
|
port = 443
|
|
|
|
else:
|
|
|
|
port = 80
|
|
|
|
port = int(port)
|
|
|
|
if host is None:
|
2012-02-18 01:45:22 +00:00
|
|
|
if self.config.reverse_proxy:
|
|
|
|
scheme, host, port = self.config.reverse_proxy
|
|
|
|
else:
|
|
|
|
# FIXME: We only specify the first part of the invalid request in this error.
|
|
|
|
# We should gather up everything read from the socket, and specify it all.
|
|
|
|
raise ProxyError(400, 'Invalid request: %s'%line)
|
2011-07-14 03:59:27 +00:00
|
|
|
if "expect" in headers:
|
2010-11-12 15:01:17 +00:00
|
|
|
expect = ",".join(headers['expect'])
|
|
|
|
if expect == "100-continue" and httpminor >= 1:
|
|
|
|
self.wfile.write('HTTP/1.1 100 Continue\r\n')
|
|
|
|
self.wfile.write('Proxy-agent: %s\r\n'%NAME)
|
|
|
|
self.wfile.write('\r\n')
|
|
|
|
del headers['expect']
|
|
|
|
else:
|
|
|
|
raise ProxyError(417, 'Unmet expect: %s'%expect)
|
|
|
|
if httpminor == 0:
|
|
|
|
client_conn.close = True
|
2011-07-14 03:59:27 +00:00
|
|
|
if "connection" in headers:
|
2010-11-12 15:01:17 +00:00
|
|
|
for value in ",".join(headers['connection']).split(","):
|
|
|
|
value = value.strip()
|
|
|
|
if value == "close":
|
|
|
|
client_conn.close = True
|
|
|
|
if value == "keep-alive":
|
|
|
|
client_conn.close = False
|
2011-09-09 03:27:31 +00:00
|
|
|
content = read_http_body(self.rfile, client_conn, headers, False, self.config.body_size_limit)
|
2011-08-03 10:38:23 +00:00
|
|
|
return flow.Request(client_conn, host, port, scheme, method, path, headers, content)
|
2010-02-16 04:09:07 +00:00
|
|
|
|
|
|
|
def send_response(self, response):
|
2011-08-03 11:02:33 +00:00
|
|
|
self.wfile.write(response._assemble())
|
2010-02-16 04:09:07 +00:00
|
|
|
self.wfile.flush()
|
|
|
|
|
|
|
|
def terminate(self, connection, wfile, rfile):
|
2011-01-27 00:32:24 +00:00
|
|
|
self.request.close()
|
2010-02-16 04:09:07 +00:00
|
|
|
try:
|
|
|
|
if not getattr(wfile, "closed", False):
|
|
|
|
wfile.flush()
|
|
|
|
connection.close()
|
|
|
|
except IOError:
|
|
|
|
pass
|
|
|
|
|
|
|
|
def finish(self):
|
|
|
|
self.terminate(self.connection, self.wfile, self.rfile)
|
|
|
|
|
|
|
|
def send_error(self, code, body):
|
2011-01-27 01:19:48 +00:00
|
|
|
try:
|
|
|
|
import BaseHTTPServer
|
|
|
|
response = BaseHTTPServer.BaseHTTPRequestHandler.responses[code][0]
|
2010-11-12 15:01:17 +00:00
|
|
|
self.wfile.write("HTTP/1.1 %s %s\r\n" % (code, response))
|
2011-01-27 01:19:48 +00:00
|
|
|
self.wfile.write("Server: %s\r\n"%NAME)
|
2010-11-12 15:01:17 +00:00
|
|
|
self.wfile.write("Connection: close\r\n")
|
2011-01-27 01:19:48 +00:00
|
|
|
self.wfile.write("Content-type: text/html\r\n")
|
|
|
|
self.wfile.write("\r\n")
|
|
|
|
self.wfile.write('<html><head>\n<title>%d %s</title>\n</head>\n'
|
|
|
|
'<body>\n%s\n</body>\n</html>' % (code, response, body))
|
|
|
|
self.wfile.flush()
|
2011-06-23 05:00:55 +00:00
|
|
|
except:
|
2011-01-27 01:19:48 +00:00
|
|
|
pass
|
2010-02-16 04:09:07 +00:00
|
|
|
|
|
|
|
|
2011-03-12 00:47:37 +00:00
|
|
|
class ProxyServerError(Exception): pass
|
|
|
|
|
2010-02-16 04:09:07 +00:00
|
|
|
ServerBase = SocketServer.ThreadingTCPServer
|
2011-02-10 01:56:14 +00:00
|
|
|
ServerBase.daemon_threads = True # Terminate workers when main thread terminates
|
2010-02-16 04:09:07 +00:00
|
|
|
class ProxyServer(ServerBase):
|
2011-01-27 01:19:48 +00:00
|
|
|
request_queue_size = 20
|
2010-02-16 04:09:07 +00:00
|
|
|
allow_reuse_address = True
|
2011-02-19 23:53:42 +00:00
|
|
|
def __init__(self, config, port, address=''):
|
2011-03-12 00:47:37 +00:00
|
|
|
"""
|
|
|
|
Raises ProxyServerError if there's a startup problem.
|
|
|
|
"""
|
2011-02-19 23:53:42 +00:00
|
|
|
self.config, self.port, self.address = config, port, address
|
2011-03-12 00:47:37 +00:00
|
|
|
try:
|
|
|
|
ServerBase.__init__(self, (address, port), ProxyHandler)
|
|
|
|
except socket.error, v:
|
|
|
|
raise ProxyServerError('Error starting proxy server: ' + v.strerror)
|
2010-02-16 04:09:07 +00:00
|
|
|
self.masterq = None
|
2011-02-20 00:29:41 +00:00
|
|
|
self.certdir = tempfile.mkdtemp(prefix="mitmproxy")
|
|
|
|
config.certdir = self.certdir
|
2010-02-16 04:09:07 +00:00
|
|
|
|
|
|
|
def set_mqueue(self, q):
|
|
|
|
self.masterq = q
|
|
|
|
|
|
|
|
def finish_request(self, request, client_address):
|
2011-02-19 23:53:42 +00:00
|
|
|
self.RequestHandlerClass(self.config, request, client_address, self, self.masterq)
|
2010-02-16 04:09:07 +00:00
|
|
|
|
2011-02-19 23:12:55 +00:00
|
|
|
def shutdown(self):
|
|
|
|
ServerBase.shutdown(self)
|
2011-09-10 21:06:46 +00:00
|
|
|
try:
|
|
|
|
shutil.rmtree(self.certdir)
|
|
|
|
except OSError:
|
|
|
|
pass
|
2011-02-19 23:12:55 +00:00
|
|
|
|
2011-02-19 23:53:42 +00:00
|
|
|
|
|
|
|
# Command-line utils
|
|
|
|
def certificate_option_group(parser):
|
|
|
|
group = optparse.OptionGroup(parser, "SSL")
|
|
|
|
group.add_option(
|
|
|
|
"--cert", action="store",
|
|
|
|
type = "str", dest="cert", default=None,
|
|
|
|
help = "User-created SSL certificate file."
|
|
|
|
)
|
|
|
|
group.add_option(
|
|
|
|
"--ciphers", action="store",
|
|
|
|
type = "str", dest="ciphers", default=None,
|
|
|
|
help = "SSL ciphers."
|
|
|
|
)
|
|
|
|
parser.add_option_group(group)
|
|
|
|
|
|
|
|
|
2011-09-09 03:27:31 +00:00
|
|
|
def process_proxy_options(parser, options):
|
2011-02-19 23:53:42 +00:00
|
|
|
if options.cert:
|
|
|
|
options.cert = os.path.expanduser(options.cert)
|
|
|
|
if not os.path.exists(options.cert):
|
|
|
|
parser.error("Manually created certificate does not exist: %s"%options.cert)
|
2011-03-18 03:45:31 +00:00
|
|
|
|
|
|
|
cacert = os.path.join(options.confdir, "mitmproxy-ca.pem")
|
|
|
|
cacert = os.path.expanduser(cacert)
|
|
|
|
if not os.path.exists(cacert):
|
|
|
|
utils.dummy_ca(cacert)
|
2011-02-19 23:53:42 +00:00
|
|
|
if getattr(options, "cache", None) is not None:
|
|
|
|
options.cache = os.path.expanduser(options.cache)
|
2011-09-09 03:27:31 +00:00
|
|
|
body_size_limit = utils.parse_size(options.body_size_limit)
|
2012-02-18 01:45:22 +00:00
|
|
|
|
|
|
|
if options.reverse_proxy:
|
|
|
|
rp = utils.parse_proxy_spec(options.reverse_proxy)
|
|
|
|
if not rp:
|
|
|
|
parser.error("Invalid reverse proxy specification: %s"%options.reverse_proxy)
|
|
|
|
else:
|
|
|
|
rp = None
|
|
|
|
|
2011-09-09 02:49:34 +00:00
|
|
|
return ProxyConfig(
|
2011-02-19 23:53:42 +00:00
|
|
|
certfile = options.cert,
|
2011-03-18 03:45:31 +00:00
|
|
|
cacert = cacert,
|
2011-06-27 04:10:17 +00:00
|
|
|
ciphers = options.ciphers,
|
2011-09-09 03:27:31 +00:00
|
|
|
cert_wait_time = options.cert_wait_time,
|
2012-02-16 14:33:27 +00:00
|
|
|
body_size_limit = body_size_limit,
|
2012-02-18 01:45:22 +00:00
|
|
|
reverse_proxy = rp
|
2011-02-19 23:53:42 +00:00
|
|
|
)
|